From 7346421bedc7068d0ee005d55791e2af3c53dbfd Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Tue, 18 Apr 2023 04:03:49 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ar/android.md | 1 + i18n/ar/calendar.md | 1 + i18n/ar/cloud.md | 1 + i18n/ar/cryptocurrency.md | 1 + i18n/ar/data-redaction.md | 1 + i18n/ar/desktop-browsers.md | 1 + i18n/ar/desktop.md | 1 + i18n/ar/dns.md | 1 + i18n/ar/email-clients.md | 1 + i18n/ar/email.md | 1 + i18n/ar/encryption.md | 1 + i18n/ar/file-sharing.md | 1 + i18n/ar/financial-services.md | 1 + i18n/ar/frontends.md | 1 + i18n/ar/mobile-browsers.md | 1 + i18n/ar/multi-factor-authentication.md | 1 + i18n/ar/news-aggregators.md | 1 + i18n/ar/notebooks.md | 1 + i18n/ar/passwords.md | 1 + i18n/ar/productivity.md | 1 + i18n/ar/real-time-communication.md | 1 + i18n/ar/router.md | 1 + i18n/ar/search-engines.md | 1 + i18n/ar/tor.md | 1 + i18n/ar/video-streaming.md | 1 + i18n/ar/vpn.md | 1 + i18n/bn/android.md | 1 + i18n/bn/calendar.md | 1 + i18n/bn/cloud.md | 1 + i18n/bn/cryptocurrency.md | 1 + i18n/bn/data-redaction.md | 1 + i18n/bn/desktop-browsers.md | 1 + i18n/bn/desktop.md | 1 + i18n/bn/dns.md | 1 + i18n/bn/email-clients.md | 1 + i18n/bn/email.md | 1 + i18n/bn/encryption.md | 1 + i18n/bn/file-sharing.md | 1 + i18n/bn/financial-services.md | 1 + i18n/bn/frontends.md | 1 + i18n/bn/mobile-browsers.md | 1 + i18n/bn/multi-factor-authentication.md | 1 + i18n/bn/news-aggregators.md | 1 + i18n/bn/notebooks.md | 1 + i18n/bn/passwords.md | 1 + i18n/bn/productivity.md | 1 + i18n/bn/real-time-communication.md | 1 + i18n/bn/router.md | 1 + i18n/bn/search-engines.md | 1 + i18n/bn/tor.md | 1 + i18n/bn/video-streaming.md | 1 + i18n/bn/vpn.md | 1 + i18n/cs/android.md | 1 + i18n/cs/calendar.md | 1 + i18n/cs/cloud.md | 1 + i18n/cs/cryptocurrency.md | 1 + i18n/cs/data-redaction.md | 1 + i18n/cs/desktop-browsers.md | 1 + i18n/cs/desktop.md | 1 + i18n/cs/dns.md | 1 + i18n/cs/email-clients.md | 1 + i18n/cs/email.md | 1 + i18n/cs/encryption.md | 1 + i18n/cs/file-sharing.md | 1 + i18n/cs/financial-services.md | 1 + i18n/cs/frontends.md | 1 + i18n/cs/mobile-browsers.md | 1 + i18n/cs/multi-factor-authentication.md | 1 + i18n/cs/news-aggregators.md | 1 + i18n/cs/notebooks.md | 1 + i18n/cs/passwords.md | 1 + i18n/cs/productivity.md | 1 + i18n/cs/real-time-communication.md | 1 + i18n/cs/router.md | 1 + i18n/cs/search-engines.md | 1 + i18n/cs/tor.md | 1 + i18n/cs/video-streaming.md | 1 + i18n/cs/vpn.md | 1 + i18n/de/android.md | 1 + i18n/de/calendar.md | 1 + i18n/de/cloud.md | 1 + i18n/de/cryptocurrency.md | 1 + i18n/de/data-redaction.md | 1 + i18n/de/desktop-browsers.md | 1 + i18n/de/desktop.md | 1 + i18n/de/dns.md | 1 + i18n/de/email-clients.md | 1 + i18n/de/email.md | 1 + i18n/de/encryption.md | 1 + i18n/de/file-sharing.md | 1 + i18n/de/financial-services.md | 1 + i18n/de/frontends.md | 1 + i18n/de/mobile-browsers.md | 1 + i18n/de/multi-factor-authentication.md | 1 + i18n/de/news-aggregators.md | 1 + i18n/de/notebooks.md | 1 + i18n/de/passwords.md | 1 + i18n/de/productivity.md | 1 + i18n/de/real-time-communication.md | 1 + i18n/de/router.md | 1 + i18n/de/search-engines.md | 1 + i18n/de/tor.md | 1 + i18n/de/video-streaming.md | 1 + i18n/de/vpn.md | 1 + i18n/el/android.md | 1 + i18n/el/calendar.md | 1 + i18n/el/cloud.md | 1 + i18n/el/cryptocurrency.md | 1 + i18n/el/data-redaction.md | 1 + i18n/el/desktop-browsers.md | 1 + i18n/el/desktop.md | 1 + i18n/el/dns.md | 1 + i18n/el/email-clients.md | 1 + i18n/el/email.md | 1 + i18n/el/encryption.md | 1 + i18n/el/file-sharing.md | 1 + i18n/el/financial-services.md | 1 + i18n/el/frontends.md | 1 + i18n/el/mobile-browsers.md | 1 + i18n/el/multi-factor-authentication.md | 1 + i18n/el/news-aggregators.md | 1 + i18n/el/notebooks.md | 1 + i18n/el/passwords.md | 1 + i18n/el/productivity.md | 1 + i18n/el/real-time-communication.md | 1 + i18n/el/router.md | 1 + i18n/el/search-engines.md | 1 + i18n/el/tor.md | 1 + i18n/el/video-streaming.md | 1 + i18n/el/vpn.md | 1 + i18n/eo/android.md | 1 + i18n/eo/calendar.md | 1 + i18n/eo/cloud.md | 1 + i18n/eo/cryptocurrency.md | 1 + i18n/eo/data-redaction.md | 1 + i18n/eo/desktop-browsers.md | 1 + i18n/eo/desktop.md | 1 + i18n/eo/dns.md | 1 + i18n/eo/email-clients.md | 1 + i18n/eo/email.md | 1 + i18n/eo/encryption.md | 1 + i18n/eo/file-sharing.md | 1 + i18n/eo/financial-services.md | 1 + i18n/eo/frontends.md | 1 + i18n/eo/mobile-browsers.md | 1 + i18n/eo/multi-factor-authentication.md | 1 + i18n/eo/news-aggregators.md | 1 + i18n/eo/notebooks.md | 1 + i18n/eo/passwords.md | 1 + i18n/eo/productivity.md | 1 + i18n/eo/real-time-communication.md | 1 + i18n/eo/router.md | 1 + i18n/eo/search-engines.md | 1 + i18n/eo/tor.md | 1 + i18n/eo/video-streaming.md | 1 + i18n/eo/vpn.md | 1 + i18n/es/android.md | 1 + i18n/es/calendar.md | 1 + i18n/es/cloud.md | 1 + i18n/es/cryptocurrency.md | 1 + i18n/es/data-redaction.md | 1 + i18n/es/desktop-browsers.md | 1 + i18n/es/desktop.md | 1 + i18n/es/dns.md | 1 + i18n/es/email-clients.md | 1 + i18n/es/email.md | 1 + i18n/es/encryption.md | 1 + i18n/es/file-sharing.md | 1 + i18n/es/financial-services.md | 1 + i18n/es/frontends.md | 1 + i18n/es/mobile-browsers.md | 1 + i18n/es/multi-factor-authentication.md | 1 + i18n/es/news-aggregators.md | 1 + i18n/es/notebooks.md | 1 + i18n/es/passwords.md | 1 + i18n/es/productivity.md | 1 + i18n/es/real-time-communication.md | 1 + i18n/es/router.md | 1 + i18n/es/search-engines.md | 1 + i18n/es/tor.md | 1 + i18n/es/video-streaming.md | 1 + i18n/es/vpn.md | 1 + i18n/fa/android.md | 1 + i18n/fa/calendar.md | 1 + i18n/fa/cloud.md | 1 + i18n/fa/cryptocurrency.md | 1 + i18n/fa/data-redaction.md | 1 + i18n/fa/desktop-browsers.md | 1 + i18n/fa/desktop.md | 1 + i18n/fa/dns.md | 1 + i18n/fa/email-clients.md | 1 + i18n/fa/email.md | 1 + i18n/fa/encryption.md | 1 + i18n/fa/file-sharing.md | 1 + i18n/fa/financial-services.md | 1 + i18n/fa/frontends.md | 1 + i18n/fa/mobile-browsers.md | 1 + i18n/fa/multi-factor-authentication.md | 1 + i18n/fa/news-aggregators.md | 1 + i18n/fa/notebooks.md | 1 + i18n/fa/passwords.md | 1 + i18n/fa/productivity.md | 1 + i18n/fa/real-time-communication.md | 1 + i18n/fa/router.md | 1 + i18n/fa/search-engines.md | 1 + i18n/fa/tor.md | 1 + i18n/fa/video-streaming.md | 1 + i18n/fa/vpn.md | 1 + i18n/fr/android.md | 1 + i18n/fr/calendar.md | 1 + i18n/fr/cloud.md | 1 + i18n/fr/cryptocurrency.md | 1 + i18n/fr/data-redaction.md | 1 + i18n/fr/desktop-browsers.md | 1 + i18n/fr/desktop.md | 1 + i18n/fr/dns.md | 1 + i18n/fr/email-clients.md | 1 + i18n/fr/email.md | 1 + i18n/fr/encryption.md | 1 + i18n/fr/file-sharing.md | 1 + i18n/fr/financial-services.md | 5 +- i18n/fr/frontends.md | 1 + i18n/fr/mobile-browsers.md | 1 + i18n/fr/multi-factor-authentication.md | 1 + i18n/fr/news-aggregators.md | 1 + i18n/fr/notebooks.md | 1 + i18n/fr/passwords.md | 1 + i18n/fr/productivity.md | 1 + i18n/fr/real-time-communication.md | 1 + i18n/fr/router.md | 1 + i18n/fr/search-engines.md | 1 + i18n/fr/tor.md | 1 + i18n/fr/video-streaming.md | 1 + i18n/fr/vpn.md | 1 + i18n/he/about/criteria.md | 2 +- i18n/he/about/donate.md | 2 +- i18n/he/about/services.md | 2 +- i18n/he/advanced/dns-overview.md | 4 +- i18n/he/android.md | 9 +- i18n/he/basics/email-security.md | 4 +- i18n/he/basics/multi-factor-authentication.md | 2 +- i18n/he/basics/threat-modeling.md | 6 +- i18n/he/basics/vpn-overview.md | 4 +- i18n/he/calendar.md | 1 + i18n/he/cloud.md | 17 +- i18n/he/cryptocurrency.md | 3 +- i18n/he/data-redaction.md | 1 + i18n/he/desktop-browsers.md | 149 ++++++------- i18n/he/desktop.md | 1 + i18n/he/dns.md | 1 + i18n/he/email-clients.md | 1 + i18n/he/email.md | 11 +- i18n/he/encryption.md | 3 +- i18n/he/file-sharing.md | 1 + i18n/he/financial-services.md | 5 +- i18n/he/frontends.md | 1 + i18n/he/index.md | 6 +- i18n/he/mobile-browsers.md | 31 +-- i18n/he/multi-factor-authentication.md | 5 +- i18n/he/news-aggregators.md | 1 + i18n/he/notebooks.md | 3 +- i18n/he/os/linux-overview.md | 2 +- i18n/he/passwords.md | 13 +- i18n/he/productivity.md | 1 + i18n/he/real-time-communication.md | 3 +- i18n/he/router.md | 1 + i18n/he/search-engines.md | 3 +- i18n/he/tools.md | 10 +- i18n/he/tor.md | 19 +- i18n/he/video-streaming.md | 1 + i18n/he/vpn.md | 5 +- i18n/hi/android.md | 1 + i18n/hi/calendar.md | 1 + i18n/hi/cloud.md | 1 + i18n/hi/cryptocurrency.md | 1 + i18n/hi/data-redaction.md | 1 + i18n/hi/desktop-browsers.md | 1 + i18n/hi/desktop.md | 1 + i18n/hi/dns.md | 1 + i18n/hi/email-clients.md | 1 + i18n/hi/email.md | 1 + i18n/hi/encryption.md | 1 + i18n/hi/file-sharing.md | 1 + i18n/hi/financial-services.md | 1 + i18n/hi/frontends.md | 1 + i18n/hi/mobile-browsers.md | 1 + i18n/hi/multi-factor-authentication.md | 1 + i18n/hi/news-aggregators.md | 1 + i18n/hi/notebooks.md | 1 + i18n/hi/passwords.md | 1 + i18n/hi/productivity.md | 1 + i18n/hi/real-time-communication.md | 1 + i18n/hi/router.md | 1 + i18n/hi/search-engines.md | 1 + i18n/hi/tor.md | 1 + i18n/hi/video-streaming.md | 1 + i18n/hi/vpn.md | 1 + i18n/hu/android.md | 1 + i18n/hu/calendar.md | 1 + i18n/hu/cloud.md | 1 + i18n/hu/cryptocurrency.md | 1 + i18n/hu/data-redaction.md | 1 + i18n/hu/desktop-browsers.md | 1 + i18n/hu/desktop.md | 1 + i18n/hu/dns.md | 1 + i18n/hu/email-clients.md | 1 + i18n/hu/email.md | 1 + i18n/hu/encryption.md | 1 + i18n/hu/file-sharing.md | 1 + i18n/hu/financial-services.md | 1 + i18n/hu/frontends.md | 1 + i18n/hu/mobile-browsers.md | 1 + i18n/hu/multi-factor-authentication.md | 1 + i18n/hu/news-aggregators.md | 1 + i18n/hu/notebooks.md | 1 + i18n/hu/passwords.md | 1 + i18n/hu/productivity.md | 1 + i18n/hu/real-time-communication.md | 1 + i18n/hu/router.md | 1 + i18n/hu/search-engines.md | 1 + i18n/hu/tor.md | 1 + i18n/hu/video-streaming.md | 1 + i18n/hu/vpn.md | 1 + i18n/id/android.md | 1 + i18n/id/calendar.md | 1 + i18n/id/cloud.md | 1 + i18n/id/cryptocurrency.md | 1 + i18n/id/data-redaction.md | 1 + i18n/id/desktop-browsers.md | 1 + i18n/id/desktop.md | 1 + i18n/id/dns.md | 1 + i18n/id/email-clients.md | 1 + i18n/id/email.md | 1 + i18n/id/encryption.md | 1 + i18n/id/file-sharing.md | 1 + i18n/id/financial-services.md | 1 + i18n/id/frontends.md | 1 + i18n/id/mobile-browsers.md | 1 + i18n/id/multi-factor-authentication.md | 1 + i18n/id/news-aggregators.md | 1 + i18n/id/notebooks.md | 1 + i18n/id/passwords.md | 1 + i18n/id/productivity.md | 1 + i18n/id/real-time-communication.md | 1 + i18n/id/router.md | 1 + i18n/id/search-engines.md | 1 + i18n/id/tor.md | 1 + i18n/id/video-streaming.md | 1 + i18n/id/vpn.md | 1 + i18n/it/about/privacytools.md | 16 +- i18n/it/android.md | 1 + i18n/it/calendar.md | 1 + i18n/it/cloud.md | 1 + i18n/it/cryptocurrency.md | 1 + i18n/it/data-redaction.md | 1 + i18n/it/desktop-browsers.md | 1 + i18n/it/desktop.md | 1 + i18n/it/dns.md | 1 + i18n/it/email-clients.md | 1 + i18n/it/email.md | 1 + i18n/it/encryption.md | 1 + i18n/it/file-sharing.md | 1 + i18n/it/financial-services.md | 1 + i18n/it/frontends.md | 1 + i18n/it/kb-archive.md | 4 +- i18n/it/meta/brand.md | 10 +- i18n/it/mobile-browsers.md | 1 + i18n/it/multi-factor-authentication.md | 1 + i18n/it/news-aggregators.md | 1 + i18n/it/notebooks.md | 1 + i18n/it/passwords.md | 1 + i18n/it/productivity.md | 1 + i18n/it/real-time-communication.md | 1 + i18n/it/router.md | 1 + i18n/it/search-engines.md | 1 + i18n/it/tor.md | 1 + i18n/it/video-streaming.md | 1 + i18n/it/vpn.md | 1 + i18n/ja/about/privacy-policy.md | 20 +- i18n/ja/android.md | 1 + i18n/ja/calendar.md | 1 + i18n/ja/cloud.md | 1 + i18n/ja/cryptocurrency.md | 1 + i18n/ja/data-redaction.md | 1 + i18n/ja/desktop-browsers.md | 37 ++-- i18n/ja/desktop.md | 1 + i18n/ja/dns.md | 1 + i18n/ja/email-clients.md | 1 + i18n/ja/email.md | 1 + i18n/ja/encryption.md | 9 +- i18n/ja/file-sharing.md | 1 + i18n/ja/financial-services.md | 1 + i18n/ja/frontends.md | 1 + i18n/ja/index.md | 2 +- i18n/ja/mobile-browsers.md | 1 + i18n/ja/multi-factor-authentication.md | 1 + i18n/ja/news-aggregators.md | 1 + i18n/ja/notebooks.md | 1 + i18n/ja/passwords.md | 1 + i18n/ja/productivity.md | 1 + i18n/ja/real-time-communication.md | 1 + i18n/ja/router.md | 1 + i18n/ja/search-engines.md | 1 + i18n/ja/tor.md | 3 +- i18n/ja/video-streaming.md | 1 + i18n/ja/vpn.md | 1 + i18n/ko/android.md | 1 + i18n/ko/calendar.md | 1 + i18n/ko/cloud.md | 1 + i18n/ko/cryptocurrency.md | 1 + i18n/ko/data-redaction.md | 1 + i18n/ko/desktop-browsers.md | 1 + i18n/ko/desktop.md | 99 ++++----- i18n/ko/dns.md | 1 + i18n/ko/email-clients.md | 1 + i18n/ko/email.md | 1 + i18n/ko/encryption.md | 1 + i18n/ko/file-sharing.md | 1 + i18n/ko/financial-services.md | 1 + i18n/ko/frontends.md | 1 + i18n/ko/mobile-browsers.md | 1 + i18n/ko/multi-factor-authentication.md | 1 + i18n/ko/news-aggregators.md | 1 + i18n/ko/notebooks.md | 1 + i18n/ko/passwords.md | 1 + i18n/ko/productivity.md | 1 + i18n/ko/real-time-communication.md | 1 + i18n/ko/router.md | 3 +- i18n/ko/search-engines.md | 1 + i18n/ko/tor.md | 1 + i18n/ko/video-streaming.md | 1 + i18n/ko/vpn.md | 115 +++++----- i18n/ku-IQ/android.md | 1 + i18n/ku-IQ/calendar.md | 1 + i18n/ku-IQ/cloud.md | 1 + i18n/ku-IQ/cryptocurrency.md | 1 + i18n/ku-IQ/data-redaction.md | 1 + i18n/ku-IQ/desktop-browsers.md | 1 + i18n/ku-IQ/desktop.md | 1 + i18n/ku-IQ/dns.md | 1 + i18n/ku-IQ/email-clients.md | 1 + i18n/ku-IQ/email.md | 1 + i18n/ku-IQ/encryption.md | 1 + i18n/ku-IQ/file-sharing.md | 1 + i18n/ku-IQ/financial-services.md | 1 + i18n/ku-IQ/frontends.md | 1 + i18n/ku-IQ/mobile-browsers.md | 1 + i18n/ku-IQ/multi-factor-authentication.md | 1 + i18n/ku-IQ/news-aggregators.md | 1 + i18n/ku-IQ/notebooks.md | 1 + i18n/ku-IQ/passwords.md | 1 + i18n/ku-IQ/productivity.md | 1 + i18n/ku-IQ/real-time-communication.md | 1 + i18n/ku-IQ/router.md | 1 + i18n/ku-IQ/search-engines.md | 1 + i18n/ku-IQ/tor.md | 1 + i18n/ku-IQ/video-streaming.md | 1 + i18n/ku-IQ/vpn.md | 1 + i18n/nl/android.md | 1 + i18n/nl/calendar.md | 1 + i18n/nl/cloud.md | 1 + i18n/nl/cryptocurrency.md | 1 + i18n/nl/data-redaction.md | 1 + i18n/nl/desktop-browsers.md | 1 + i18n/nl/desktop.md | 1 + i18n/nl/dns.md | 1 + i18n/nl/email-clients.md | 1 + i18n/nl/email.md | 1 + i18n/nl/encryption.md | 1 + i18n/nl/file-sharing.md | 1 + i18n/nl/financial-services.md | 1 + i18n/nl/frontends.md | 1 + i18n/nl/mobile-browsers.md | 1 + i18n/nl/multi-factor-authentication.md | 1 + i18n/nl/news-aggregators.md | 1 + i18n/nl/notebooks.md | 1 + i18n/nl/passwords.md | 1 + i18n/nl/productivity.md | 1 + i18n/nl/real-time-communication.md | 1 + i18n/nl/router.md | 1 + i18n/nl/search-engines.md | 1 + i18n/nl/tor.md | 1 + i18n/nl/video-streaming.md | 1 + i18n/nl/vpn.md | 1 + i18n/pl/android.md | 1 + i18n/pl/calendar.md | 1 + i18n/pl/cloud.md | 1 + i18n/pl/cryptocurrency.md | 1 + i18n/pl/data-redaction.md | 1 + i18n/pl/desktop-browsers.md | 1 + i18n/pl/desktop.md | 1 + i18n/pl/dns.md | 1 + i18n/pl/email-clients.md | 1 + i18n/pl/email.md | 1 + i18n/pl/encryption.md | 1 + i18n/pl/file-sharing.md | 1 + i18n/pl/financial-services.md | 1 + i18n/pl/frontends.md | 1 + i18n/pl/mobile-browsers.md | 1 + i18n/pl/multi-factor-authentication.md | 1 + i18n/pl/news-aggregators.md | 1 + i18n/pl/notebooks.md | 1 + i18n/pl/passwords.md | 1 + i18n/pl/productivity.md | 1 + i18n/pl/real-time-communication.md | 1 + i18n/pl/router.md | 1 + i18n/pl/search-engines.md | 1 + i18n/pl/tor.md | 1 + i18n/pl/video-streaming.md | 1 + i18n/pl/vpn.md | 1 + i18n/pt-BR/android.md | 1 + i18n/pt-BR/calendar.md | 1 + i18n/pt-BR/cloud.md | 1 + i18n/pt-BR/cryptocurrency.md | 1 + i18n/pt-BR/data-redaction.md | 1 + i18n/pt-BR/desktop-browsers.md | 1 + i18n/pt-BR/desktop.md | 1 + i18n/pt-BR/dns.md | 1 + i18n/pt-BR/email-clients.md | 1 + i18n/pt-BR/email.md | 1 + i18n/pt-BR/encryption.md | 1 + i18n/pt-BR/file-sharing.md | 1 + i18n/pt-BR/financial-services.md | 1 + i18n/pt-BR/frontends.md | 1 + i18n/pt-BR/mobile-browsers.md | 1 + i18n/pt-BR/multi-factor-authentication.md | 1 + i18n/pt-BR/news-aggregators.md | 1 + i18n/pt-BR/notebooks.md | 1 + i18n/pt-BR/passwords.md | 1 + i18n/pt-BR/productivity.md | 1 + i18n/pt-BR/real-time-communication.md | 1 + i18n/pt-BR/router.md | 1 + i18n/pt-BR/search-engines.md | 1 + i18n/pt-BR/tor.md | 1 + i18n/pt-BR/video-streaming.md | 1 + i18n/pt-BR/vpn.md | 1 + i18n/pt/android.md | 1 + i18n/pt/calendar.md | 1 + i18n/pt/cloud.md | 1 + i18n/pt/cryptocurrency.md | 1 + i18n/pt/data-redaction.md | 1 + i18n/pt/desktop-browsers.md | 1 + i18n/pt/desktop.md | 1 + i18n/pt/dns.md | 1 + i18n/pt/email-clients.md | 1 + i18n/pt/email.md | 1 + i18n/pt/encryption.md | 1 + i18n/pt/file-sharing.md | 1 + i18n/pt/financial-services.md | 1 + i18n/pt/frontends.md | 1 + i18n/pt/mobile-browsers.md | 1 + i18n/pt/multi-factor-authentication.md | 1 + i18n/pt/news-aggregators.md | 1 + i18n/pt/notebooks.md | 1 + i18n/pt/passwords.md | 1 + i18n/pt/productivity.md | 1 + i18n/pt/real-time-communication.md | 1 + i18n/pt/router.md | 1 + i18n/pt/search-engines.md | 1 + i18n/pt/tor.md | 1 + i18n/pt/video-streaming.md | 1 + i18n/pt/vpn.md | 1 + i18n/ru/android.md | 1 + i18n/ru/calendar.md | 1 + i18n/ru/cloud.md | 1 + i18n/ru/cryptocurrency.md | 1 + i18n/ru/data-redaction.md | 1 + i18n/ru/desktop-browsers.md | 1 + i18n/ru/desktop.md | 1 + i18n/ru/dns.md | 1 + i18n/ru/email-clients.md | 1 + i18n/ru/email.md | 1 + i18n/ru/encryption.md | 1 + i18n/ru/file-sharing.md | 1 + i18n/ru/financial-services.md | 1 + i18n/ru/frontends.md | 1 + i18n/ru/mobile-browsers.md | 1 + i18n/ru/multi-factor-authentication.md | 1 + i18n/ru/news-aggregators.md | 1 + i18n/ru/notebooks.md | 1 + i18n/ru/passwords.md | 1 + i18n/ru/productivity.md | 1 + i18n/ru/real-time-communication.md | 1 + i18n/ru/router.md | 1 + i18n/ru/search-engines.md | 1 + i18n/ru/tor.md | 1 + i18n/ru/video-streaming.md | 1 + i18n/ru/vpn.md | 19 +- i18n/sv/android.md | 1 + i18n/sv/calendar.md | 1 + i18n/sv/cloud.md | 1 + i18n/sv/cryptocurrency.md | 1 + i18n/sv/data-redaction.md | 1 + i18n/sv/desktop-browsers.md | 1 + i18n/sv/desktop.md | 1 + i18n/sv/dns.md | 1 + i18n/sv/email-clients.md | 1 + i18n/sv/email.md | 1 + i18n/sv/encryption.md | 1 + i18n/sv/file-sharing.md | 1 + i18n/sv/financial-services.md | 1 + i18n/sv/frontends.md | 1 + i18n/sv/mobile-browsers.md | 1 + i18n/sv/multi-factor-authentication.md | 1 + i18n/sv/news-aggregators.md | 1 + i18n/sv/notebooks.md | 1 + i18n/sv/passwords.md | 1 + i18n/sv/productivity.md | 1 + i18n/sv/real-time-communication.md | 1 + i18n/sv/router.md | 1 + i18n/sv/search-engines.md | 1 + i18n/sv/tor.md | 1 + i18n/sv/video-streaming.md | 1 + i18n/sv/vpn.md | 1 + i18n/tr/android.md | 1 + i18n/tr/calendar.md | 1 + i18n/tr/cloud.md | 1 + i18n/tr/cryptocurrency.md | 1 + i18n/tr/data-redaction.md | 1 + i18n/tr/desktop-browsers.md | 1 + i18n/tr/desktop.md | 1 + i18n/tr/dns.md | 1 + i18n/tr/email-clients.md | 1 + i18n/tr/email.md | 1 + i18n/tr/encryption.md | 1 + i18n/tr/file-sharing.md | 1 + i18n/tr/financial-services.md | 1 + i18n/tr/frontends.md | 1 + i18n/tr/mobile-browsers.md | 1 + i18n/tr/multi-factor-authentication.md | 1 + i18n/tr/news-aggregators.md | 1 + i18n/tr/notebooks.md | 1 + i18n/tr/passwords.md | 1 + i18n/tr/productivity.md | 1 + i18n/tr/real-time-communication.md | 1 + i18n/tr/router.md | 1 + i18n/tr/search-engines.md | 1 + i18n/tr/tor.md | 1 + i18n/tr/video-streaming.md | 1 + i18n/tr/vpn.md | 1 + i18n/uk/android.md | 1 + i18n/uk/calendar.md | 1 + i18n/uk/cloud.md | 1 + i18n/uk/cryptocurrency.md | 1 + i18n/uk/data-redaction.md | 1 + i18n/uk/desktop-browsers.md | 1 + i18n/uk/desktop.md | 1 + i18n/uk/dns.md | 1 + i18n/uk/email-clients.md | 1 + i18n/uk/email.md | 1 + i18n/uk/encryption.md | 1 + i18n/uk/file-sharing.md | 1 + i18n/uk/financial-services.md | 1 + i18n/uk/frontends.md | 1 + i18n/uk/mobile-browsers.md | 1 + i18n/uk/multi-factor-authentication.md | 1 + i18n/uk/news-aggregators.md | 1 + i18n/uk/notebooks.md | 1 + i18n/uk/passwords.md | 1 + i18n/uk/productivity.md | 1 + i18n/uk/real-time-communication.md | 1 + i18n/uk/router.md | 1 + i18n/uk/search-engines.md | 1 + i18n/uk/tor.md | 1 + i18n/uk/video-streaming.md | 1 + i18n/uk/vpn.md | 1 + i18n/vi/android.md | 1 + i18n/vi/calendar.md | 1 + i18n/vi/cloud.md | 1 + i18n/vi/cryptocurrency.md | 1 + i18n/vi/data-redaction.md | 1 + i18n/vi/desktop-browsers.md | 1 + i18n/vi/desktop.md | 1 + i18n/vi/dns.md | 1 + i18n/vi/email-clients.md | 1 + i18n/vi/email.md | 1 + i18n/vi/encryption.md | 1 + i18n/vi/file-sharing.md | 1 + i18n/vi/financial-services.md | 1 + i18n/vi/frontends.md | 1 + i18n/vi/mobile-browsers.md | 1 + i18n/vi/multi-factor-authentication.md | 1 + i18n/vi/news-aggregators.md | 1 + i18n/vi/notebooks.md | 1 + i18n/vi/passwords.md | 1 + i18n/vi/productivity.md | 1 + i18n/vi/real-time-communication.md | 1 + i18n/vi/router.md | 1 + i18n/vi/search-engines.md | 1 + i18n/vi/tor.md | 1 + i18n/vi/video-streaming.md | 1 + i18n/vi/vpn.md | 1 + i18n/zh-Hant/android.md | 1 + i18n/zh-Hant/calendar.md | 1 + i18n/zh-Hant/cloud.md | 1 + i18n/zh-Hant/cryptocurrency.md | 1 + i18n/zh-Hant/data-redaction.md | 1 + i18n/zh-Hant/desktop-browsers.md | 199 +++++++++--------- i18n/zh-Hant/desktop.md | 1 + i18n/zh-Hant/dns.md | 1 + i18n/zh-Hant/email-clients.md | 1 + i18n/zh-Hant/email.md | 1 + i18n/zh-Hant/encryption.md | 1 + i18n/zh-Hant/file-sharing.md | 1 + i18n/zh-Hant/financial-services.md | 1 + i18n/zh-Hant/frontends.md | 1 + i18n/zh-Hant/mobile-browsers.md | 1 + i18n/zh-Hant/multi-factor-authentication.md | 1 + i18n/zh-Hant/news-aggregators.md | 1 + i18n/zh-Hant/notebooks.md | 1 + i18n/zh-Hant/passwords.md | 1 + i18n/zh-Hant/productivity.md | 1 + i18n/zh-Hant/real-time-communication.md | 118 ++++++----- i18n/zh-Hant/router.md | 1 + i18n/zh-Hant/search-engines.md | 1 + i18n/zh-Hant/tor.md | 1 + i18n/zh-Hant/video-streaming.md | 1 + i18n/zh-Hant/vpn.md | 1 + i18n/zh/android.md | 1 + i18n/zh/calendar.md | 1 + i18n/zh/cloud.md | 1 + i18n/zh/cryptocurrency.md | 1 + i18n/zh/data-redaction.md | 1 + i18n/zh/desktop-browsers.md | 1 + i18n/zh/desktop.md | 1 + i18n/zh/dns.md | 1 + i18n/zh/email-clients.md | 1 + i18n/zh/email.md | 1 + i18n/zh/encryption.md | 1 + i18n/zh/file-sharing.md | 1 + i18n/zh/financial-services.md | 1 + i18n/zh/frontends.md | 1 + i18n/zh/mobile-browsers.md | 1 + i18n/zh/multi-factor-authentication.md | 1 + i18n/zh/news-aggregators.md | 1 + i18n/zh/notebooks.md | 1 + i18n/zh/passwords.md | 1 + i18n/zh/productivity.md | 1 + i18n/zh/real-time-communication.md | 1 + i18n/zh/router.md | 1 + i18n/zh/search-engines.md | 1 + i18n/zh/tor.md | 1 + i18n/zh/video-streaming.md | 1 + i18n/zh/vpn.md | 1 + includes/abbreviations.he.txt | 4 +- includes/strings.he.yml | 22 +- theme/overrides/home.ar.html | 4 + theme/overrides/home.bn.html | 4 + theme/overrides/home.cs.html | 4 + theme/overrides/home.de.html | 4 + theme/overrides/home.el.html | 4 + theme/overrides/home.eo.html | 4 + theme/overrides/home.es.html | 4 + theme/overrides/home.fa.html | 4 + theme/overrides/home.fr.html | 4 + theme/overrides/home.he.html | 4 + theme/overrides/home.hi.html | 4 + theme/overrides/home.hu.html | 4 + theme/overrides/home.id.html | 4 + theme/overrides/home.it.html | 4 + theme/overrides/home.ja.html | 4 + theme/overrides/home.ko.html | 4 + theme/overrides/home.ku-IQ.html | 4 + theme/overrides/home.nl.html | 4 + theme/overrides/home.pl.html | 4 + theme/overrides/home.pt-BR.html | 4 + theme/overrides/home.pt.html | 4 + theme/overrides/home.ru.html | 4 + theme/overrides/home.sv.html | 4 + theme/overrides/home.tr.html | 4 + theme/overrides/home.uk.html | 4 + theme/overrides/home.vi.html | 4 + theme/overrides/home.zh-Hant.html | 4 + theme/overrides/home.zh.html | 4 + 774 files changed, 1336 insertions(+), 487 deletions(-) diff --git a/i18n/ar/android.md b/i18n/ar/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/ar/android.md +++ b/i18n/ar/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/ar/calendar.md b/i18n/ar/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/ar/calendar.md +++ b/i18n/ar/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/ar/cloud.md +++ b/i18n/ar/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/ar/cryptocurrency.md b/i18n/ar/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/ar/cryptocurrency.md +++ b/i18n/ar/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ar/data-redaction.md b/i18n/ar/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/ar/data-redaction.md +++ b/i18n/ar/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/ar/desktop-browsers.md b/i18n/ar/desktop-browsers.md index ddf97bdb..682e294e 100644 --- a/i18n/ar/desktop-browsers.md +++ b/i18n/ar/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ar/desktop.md b/i18n/ar/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/ar/desktop.md +++ b/i18n/ar/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/ar/dns.md b/i18n/ar/dns.md index 29ddcde9..0ed30dce 100644 --- a/i18n/ar/dns.md +++ b/i18n/ar/dns.md @@ -2,6 +2,7 @@ title: "محلِّلات أنظمة أسماء النطاقات (DNS)" icon: material/dns description: هنا بعض موفِّري خدمة أنظمة أسماء النطاقات المعمَّاة لتستبدل ما ضبطه لك موفِّر خدمة الإنترنت. +cover: dns.png --- ينبغي استخدام أنظمة أسماء النطاقات المعمَّاة الموجودة في خوادم جهات خارجية فقط لتجاوز [حظرها](https://en.wikipedia.org/wiki/DNS_blocking)، وذلك إن تيقَّنت من أن ذلك ليست له عواقب. لن يخفي استخدام نظام أسماء نطاق معمًّى ما تتصفَّح. diff --git a/i18n/ar/email-clients.md b/i18n/ar/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/ar/email-clients.md +++ b/i18n/ar/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/ar/email.md b/i18n/ar/email.md index c834046f..8091cb53 100644 --- a/i18n/ar/email.md +++ b/i18n/ar/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "البُرُد الإلكترونية" icon: material/email description: توفِّر الجهات المذكورة مخزنًا آمنًا لرسائلك، والكثير منهم يدعم تعمية أوبن‌بي‌جي‌بي مع جهات أخرى. +cover: email.png --- حتَّى ولو كان البريد الإلكتروني حاجةً لتستخدم أيَّ خدمة إنترنت فإننا لا نوصي به للتحادث. تأمَّل استخدام خدمة اتصال مباشر تدعم السرية المستقبلية لتحادث الناس بدلًا من استخدام بريد إلكتروني. diff --git a/i18n/ar/encryption.md b/i18n/ar/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/ar/encryption.md +++ b/i18n/ar/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/ar/file-sharing.md b/i18n/ar/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/ar/file-sharing.md +++ b/i18n/ar/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/ar/financial-services.md b/i18n/ar/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/ar/financial-services.md +++ b/i18n/ar/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ar/frontends.md b/i18n/ar/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/ar/frontends.md +++ b/i18n/ar/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ar/mobile-browsers.md b/i18n/ar/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/ar/mobile-browsers.md +++ b/i18n/ar/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ar/multi-factor-authentication.md b/i18n/ar/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/ar/multi-factor-authentication.md +++ b/i18n/ar/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/ar/news-aggregators.md b/i18n/ar/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/ar/news-aggregators.md +++ b/i18n/ar/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/ar/notebooks.md b/i18n/ar/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/ar/notebooks.md +++ b/i18n/ar/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/ar/passwords.md b/i18n/ar/passwords.md index 485231b1..2ec47075 100644 --- a/i18n/ar/passwords.md +++ b/i18n/ar/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/ar/productivity.md b/i18n/ar/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/ar/productivity.md +++ b/i18n/ar/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/ar/real-time-communication.md b/i18n/ar/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/ar/real-time-communication.md +++ b/i18n/ar/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/ar/router.md b/i18n/ar/router.md index a494c017..834c59f6 100644 --- a/i18n/ar/router.md +++ b/i18n/ar/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/ar/search-engines.md b/i18n/ar/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/ar/search-engines.md +++ b/i18n/ar/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/ar/tor.md b/i18n/ar/tor.md index c0933ee4..ebf55582 100644 --- a/i18n/ar/tor.md +++ b/i18n/ar/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/ar/video-streaming.md b/i18n/ar/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/ar/video-streaming.md +++ b/i18n/ar/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/ar/vpn.md b/i18n/ar/vpn.md index 1b42d5dd..cbfb043f 100644 --- a/i18n/ar/vpn.md +++ b/i18n/ar/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "خِدْمَات شبكة خاصة افتراضية" icon: material/vpn description: هذه هي أفضل خِدْمَات شبكة خاصة افتراضية للمحافظة خصوصيتك وأمانك على الإنترنت. اعثر على مزود للخدمة هنا ليس يريد التجسس عليك. +cover: vpn.png --- إذا كنت تبحث عن **خصوصية** إضافية من مزود خدمة الإنترنت لك، أو عندما تتصل بشبكة واي-فاي عامة، أو في أثناء استخدامك لشبكة تورنت، قد يكون استخدام شبكة خاصة افتراضية هو الحل بالنسبة لك ما دمت على دراية بالمخاطر المترتبة على ذلك. نعتقد بأن هؤلاء هم أفضل المزودين: diff --git a/i18n/bn/android.md b/i18n/bn/android.md index a63a51ac..701fbccb 100644 --- a/i18n/bn/android.md +++ b/i18n/bn/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "অ্যান্ড্রয়েড" icon: 'ফন্টঅ্যাওসাম/ ব্র্যান্ড / অ্যান্ড্রয়েড' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/bn/calendar.md b/i18n/bn/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/bn/calendar.md +++ b/i18n/bn/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/bn/cloud.md +++ b/i18n/bn/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/bn/cryptocurrency.md b/i18n/bn/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/bn/cryptocurrency.md +++ b/i18n/bn/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/bn/data-redaction.md b/i18n/bn/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/bn/data-redaction.md +++ b/i18n/bn/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/bn/desktop-browsers.md b/i18n/bn/desktop-browsers.md index ddf97bdb..682e294e 100644 --- a/i18n/bn/desktop-browsers.md +++ b/i18n/bn/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/bn/desktop.md b/i18n/bn/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/bn/desktop.md +++ b/i18n/bn/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/bn/dns.md b/i18n/bn/dns.md index 7d24c217..9ebd0a8b 100644 --- a/i18n/bn/dns.md +++ b/i18n/bn/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/bn/email-clients.md b/i18n/bn/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/bn/email-clients.md +++ b/i18n/bn/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/bn/email.md b/i18n/bn/email.md index 43efeb41..1e82b075 100644 --- a/i18n/bn/email.md +++ b/i18n/bn/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/bn/encryption.md b/i18n/bn/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/bn/encryption.md +++ b/i18n/bn/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/bn/file-sharing.md b/i18n/bn/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/bn/file-sharing.md +++ b/i18n/bn/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/bn/financial-services.md b/i18n/bn/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/bn/financial-services.md +++ b/i18n/bn/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/bn/frontends.md b/i18n/bn/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/bn/frontends.md +++ b/i18n/bn/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/bn/mobile-browsers.md b/i18n/bn/mobile-browsers.md index 360b25fa..3a79e05a 100644 --- a/i18n/bn/mobile-browsers.md +++ b/i18n/bn/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/bn/multi-factor-authentication.md b/i18n/bn/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/bn/multi-factor-authentication.md +++ b/i18n/bn/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/bn/news-aggregators.md b/i18n/bn/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/bn/news-aggregators.md +++ b/i18n/bn/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/bn/notebooks.md b/i18n/bn/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/bn/notebooks.md +++ b/i18n/bn/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/bn/passwords.md b/i18n/bn/passwords.md index 9fcd5620..a11ac0a7 100644 --- a/i18n/bn/passwords.md +++ b/i18n/bn/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/bn/productivity.md b/i18n/bn/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/bn/productivity.md +++ b/i18n/bn/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/bn/real-time-communication.md b/i18n/bn/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/bn/real-time-communication.md +++ b/i18n/bn/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/bn/router.md b/i18n/bn/router.md index a494c017..834c59f6 100644 --- a/i18n/bn/router.md +++ b/i18n/bn/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/bn/search-engines.md b/i18n/bn/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/bn/search-engines.md +++ b/i18n/bn/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/bn/tor.md b/i18n/bn/tor.md index 02767509..742f3bec 100644 --- a/i18n/bn/tor.md +++ b/i18n/bn/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/bn/video-streaming.md b/i18n/bn/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/bn/video-streaming.md +++ b/i18n/bn/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/bn/vpn.md b/i18n/bn/vpn.md index e281b025..28439285 100644 --- a/i18n/bn/vpn.md +++ b/i18n/bn/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/cs/android.md b/i18n/cs/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/cs/android.md +++ b/i18n/cs/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/cs/calendar.md b/i18n/cs/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/cs/calendar.md +++ b/i18n/cs/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/cs/cloud.md +++ b/i18n/cs/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/cs/cryptocurrency.md b/i18n/cs/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/cs/cryptocurrency.md +++ b/i18n/cs/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/cs/data-redaction.md +++ b/i18n/cs/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/cs/desktop-browsers.md b/i18n/cs/desktop-browsers.md index 584edc0a..3dee3e0c 100644 --- a/i18n/cs/desktop-browsers.md +++ b/i18n/cs/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Prohlížeče pro počítače" icon: material/laptop description: Tyto webové prohlížeče nabízejí lepší ochranu soukromí než Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/cs/desktop.md b/i18n/cs/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/cs/desktop.md +++ b/i18n/cs/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/cs/dns.md b/i18n/cs/dns.md index 4ed4fad4..ac59886f 100644 --- a/i18n/cs/dns.md +++ b/i18n/cs/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/cs/email-clients.md b/i18n/cs/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/cs/email-clients.md +++ b/i18n/cs/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/cs/email.md b/i18n/cs/email.md index 43efeb41..1e82b075 100644 --- a/i18n/cs/email.md +++ b/i18n/cs/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/cs/encryption.md b/i18n/cs/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/cs/encryption.md +++ b/i18n/cs/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/cs/file-sharing.md b/i18n/cs/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/cs/file-sharing.md +++ b/i18n/cs/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/cs/financial-services.md b/i18n/cs/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/cs/financial-services.md +++ b/i18n/cs/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/cs/frontends.md b/i18n/cs/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/cs/frontends.md +++ b/i18n/cs/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/cs/mobile-browsers.md b/i18n/cs/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/cs/mobile-browsers.md +++ b/i18n/cs/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/cs/multi-factor-authentication.md b/i18n/cs/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/cs/multi-factor-authentication.md +++ b/i18n/cs/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/cs/news-aggregators.md b/i18n/cs/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/cs/news-aggregators.md +++ b/i18n/cs/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/cs/notebooks.md b/i18n/cs/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/cs/notebooks.md +++ b/i18n/cs/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/cs/passwords.md b/i18n/cs/passwords.md index 485231b1..2ec47075 100644 --- a/i18n/cs/passwords.md +++ b/i18n/cs/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/cs/productivity.md b/i18n/cs/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/cs/productivity.md +++ b/i18n/cs/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/cs/real-time-communication.md +++ b/i18n/cs/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/cs/router.md b/i18n/cs/router.md index a494c017..834c59f6 100644 --- a/i18n/cs/router.md +++ b/i18n/cs/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/cs/search-engines.md b/i18n/cs/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/cs/search-engines.md +++ b/i18n/cs/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/cs/tor.md b/i18n/cs/tor.md index 8142c1da..d27411a3 100644 --- a/i18n/cs/tor.md +++ b/i18n/cs/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/cs/video-streaming.md b/i18n/cs/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/cs/video-streaming.md +++ b/i18n/cs/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/cs/vpn.md b/i18n/cs/vpn.md index e281b025..28439285 100644 --- a/i18n/cs/vpn.md +++ b/i18n/cs/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/de/android.md b/i18n/de/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/de/android.md +++ b/i18n/de/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/de/calendar.md b/i18n/de/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/de/calendar.md +++ b/i18n/de/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/de/cloud.md +++ b/i18n/de/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/de/cryptocurrency.md b/i18n/de/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/de/cryptocurrency.md +++ b/i18n/de/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/de/data-redaction.md b/i18n/de/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/de/data-redaction.md +++ b/i18n/de/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/de/desktop-browsers.md b/i18n/de/desktop-browsers.md index d1e54139..1e4b42bf 100644 --- a/i18n/de/desktop-browsers.md +++ b/i18n/de/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Datenschutzfreundliche Webbrowser für PC und Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: Diese Webbrowser bieten einen stärkeren Schutz der Privatsphäre als Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/de/desktop.md b/i18n/de/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/de/desktop.md +++ b/i18n/de/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/de/dns.md b/i18n/de/dns.md index 867d1fd1..6d06c55e 100644 --- a/i18n/de/dns.md +++ b/i18n/de/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Verschlüsseltes DNS hilft dir nicht dabei, deine Browsing-Aktivitäten zu verbergen. diff --git a/i18n/de/email-clients.md b/i18n/de/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/de/email-clients.md +++ b/i18n/de/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/de/email.md b/i18n/de/email.md index 686da575..c05e548e 100644 --- a/i18n/de/email.md +++ b/i18n/de/email.md @@ -3,6 +3,7 @@ meta_title: "Empfehlungen für verschlüsselte private E-Mail-Dienste - Privacy title: "E-Mail Dienste" icon: material/email description: Diese E-Mail-Dienstleister speichern deine E-Mails sicher und viele davon bieten auch interoperable OpenPGP-Verschlüsselung mit anderen Anbietern. +cover: email.png --- E-Mail ist praktisch eine Voraussetzung für die Nutzung aller Online-Dienste, wir empfehlen sie jedoch nicht zur Kommunikation von Mensch zu Mensch. Anstatt E-Mails für die Kontaktaufnahme mit anderen Personen zu verwenden, überleg ob du einen Instant Messenger benutzen kannst, der Forward Secrecy (auf Deutsch etwa "vorwärts gerichtete Geheimhaltung") unterstützt. diff --git a/i18n/de/encryption.md b/i18n/de/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/de/encryption.md +++ b/i18n/de/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/de/file-sharing.md b/i18n/de/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/de/file-sharing.md +++ b/i18n/de/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/de/financial-services.md b/i18n/de/financial-services.md index e7fb5b96..8aa765c9 100644 --- a/i18n/de/financial-services.md +++ b/i18n/de/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/de/frontends.md b/i18n/de/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/de/frontends.md +++ b/i18n/de/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/de/mobile-browsers.md b/i18n/de/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/de/mobile-browsers.md +++ b/i18n/de/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/de/multi-factor-authentication.md b/i18n/de/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/de/multi-factor-authentication.md +++ b/i18n/de/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/de/news-aggregators.md b/i18n/de/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/de/news-aggregators.md +++ b/i18n/de/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/de/notebooks.md b/i18n/de/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/de/notebooks.md +++ b/i18n/de/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/de/passwords.md b/i18n/de/passwords.md index 485231b1..2ec47075 100644 --- a/i18n/de/passwords.md +++ b/i18n/de/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/de/productivity.md b/i18n/de/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/de/productivity.md +++ b/i18n/de/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/de/real-time-communication.md +++ b/i18n/de/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/de/router.md b/i18n/de/router.md index 64521da3..ab8a377f 100644 --- a/i18n/de/router.md +++ b/i18n/de/router.md @@ -2,6 +2,7 @@ title: "Router-Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Nachstehend sind ein paar alternative Betriebssysteme gelistet, die auf Routern, WLAN-Zugangspunkten usw. eingesetzt werden können. diff --git a/i18n/de/search-engines.md b/i18n/de/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/de/search-engines.md +++ b/i18n/de/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/de/tor.md b/i18n/de/tor.md index 518ae6b7..3e6917b2 100644 --- a/i18n/de/tor.md +++ b/i18n/de/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/de/video-streaming.md b/i18n/de/video-streaming.md index e62ce3da..1929a295 100644 --- a/i18n/de/video-streaming.md +++ b/i18n/de/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- Die primäre Bedrohung bei der Nutzung einer Videostreaming-Plattform besteht darin, dass deine Streaming-Gewohnheiten und Abonnementlisten dazu verwendet werden könnten, um ein Profil von dir zu erstellen. Du solltest diese Tools zusammen mit einem [VPN](vpn.md) oder [Tor](https://www.torproject.org/) verwenden, damit nicht so leicht ein Nutzungsprofil von dir erstellt werden kann. diff --git a/i18n/de/vpn.md b/i18n/de/vpn.md index 439e390b..49cc6b69 100644 --- a/i18n/de/vpn.md +++ b/i18n/de/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/el/android.md b/i18n/el/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/el/android.md +++ b/i18n/el/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/el/calendar.md b/i18n/el/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/el/calendar.md +++ b/i18n/el/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/el/cloud.md +++ b/i18n/el/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/el/cryptocurrency.md b/i18n/el/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/el/cryptocurrency.md +++ b/i18n/el/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/el/data-redaction.md b/i18n/el/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/el/data-redaction.md +++ b/i18n/el/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/el/desktop-browsers.md b/i18n/el/desktop-browsers.md index ddf97bdb..682e294e 100644 --- a/i18n/el/desktop-browsers.md +++ b/i18n/el/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/el/desktop.md b/i18n/el/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/el/desktop.md +++ b/i18n/el/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/el/dns.md b/i18n/el/dns.md index a8cc21da..18ec4ddd 100644 --- a/i18n/el/dns.md +++ b/i18n/el/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/el/email-clients.md b/i18n/el/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/el/email-clients.md +++ b/i18n/el/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/el/email.md b/i18n/el/email.md index 43efeb41..1e82b075 100644 --- a/i18n/el/email.md +++ b/i18n/el/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/el/encryption.md b/i18n/el/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/el/encryption.md +++ b/i18n/el/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/el/file-sharing.md b/i18n/el/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/el/file-sharing.md +++ b/i18n/el/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/el/financial-services.md b/i18n/el/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/el/financial-services.md +++ b/i18n/el/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/el/frontends.md b/i18n/el/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/el/frontends.md +++ b/i18n/el/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/el/mobile-browsers.md b/i18n/el/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/el/mobile-browsers.md +++ b/i18n/el/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/el/multi-factor-authentication.md b/i18n/el/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/el/multi-factor-authentication.md +++ b/i18n/el/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/el/news-aggregators.md b/i18n/el/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/el/news-aggregators.md +++ b/i18n/el/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/el/notebooks.md b/i18n/el/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/el/notebooks.md +++ b/i18n/el/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/el/passwords.md b/i18n/el/passwords.md index 485231b1..2ec47075 100644 --- a/i18n/el/passwords.md +++ b/i18n/el/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/el/productivity.md b/i18n/el/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/el/productivity.md +++ b/i18n/el/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/el/real-time-communication.md b/i18n/el/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/el/real-time-communication.md +++ b/i18n/el/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/el/router.md b/i18n/el/router.md index 2d6ecba5..2139f91f 100644 --- a/i18n/el/router.md +++ b/i18n/el/router.md @@ -2,6 +2,7 @@ title: "Υλικολογισμικό Δρομολογητή" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Παρακάτω είναι μερικά εναλλακτικά λειτουργικά συστήματα τα οποία μπορούν να χρησιμοποιηθούν σε δρομολογητές, σημεία πρόσβασης Wi-Fi, κλπ. diff --git a/i18n/el/search-engines.md b/i18n/el/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/el/search-engines.md +++ b/i18n/el/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/el/tor.md b/i18n/el/tor.md index 8142c1da..d27411a3 100644 --- a/i18n/el/tor.md +++ b/i18n/el/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/el/video-streaming.md b/i18n/el/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/el/video-streaming.md +++ b/i18n/el/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/el/vpn.md b/i18n/el/vpn.md index fda56e8b..f050e48b 100644 --- a/i18n/el/vpn.md +++ b/i18n/el/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/eo/android.md b/i18n/eo/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/eo/android.md +++ b/i18n/eo/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/eo/calendar.md b/i18n/eo/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/eo/calendar.md +++ b/i18n/eo/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/eo/cloud.md +++ b/i18n/eo/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/eo/cryptocurrency.md b/i18n/eo/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/eo/cryptocurrency.md +++ b/i18n/eo/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/eo/data-redaction.md b/i18n/eo/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/eo/data-redaction.md +++ b/i18n/eo/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/eo/desktop-browsers.md b/i18n/eo/desktop-browsers.md index ddf97bdb..682e294e 100644 --- a/i18n/eo/desktop-browsers.md +++ b/i18n/eo/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/eo/desktop.md b/i18n/eo/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/eo/desktop.md +++ b/i18n/eo/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/eo/dns.md b/i18n/eo/dns.md index a8cc21da..18ec4ddd 100644 --- a/i18n/eo/dns.md +++ b/i18n/eo/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/eo/email-clients.md b/i18n/eo/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/eo/email-clients.md +++ b/i18n/eo/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/eo/email.md b/i18n/eo/email.md index 43efeb41..1e82b075 100644 --- a/i18n/eo/email.md +++ b/i18n/eo/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/eo/encryption.md b/i18n/eo/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/eo/encryption.md +++ b/i18n/eo/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/eo/file-sharing.md b/i18n/eo/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/eo/file-sharing.md +++ b/i18n/eo/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/eo/financial-services.md b/i18n/eo/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/eo/financial-services.md +++ b/i18n/eo/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/eo/frontends.md b/i18n/eo/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/eo/frontends.md +++ b/i18n/eo/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/eo/mobile-browsers.md b/i18n/eo/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/eo/mobile-browsers.md +++ b/i18n/eo/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/eo/multi-factor-authentication.md b/i18n/eo/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/eo/multi-factor-authentication.md +++ b/i18n/eo/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/eo/news-aggregators.md b/i18n/eo/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/eo/news-aggregators.md +++ b/i18n/eo/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/eo/notebooks.md b/i18n/eo/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/eo/notebooks.md +++ b/i18n/eo/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/eo/passwords.md b/i18n/eo/passwords.md index 485231b1..2ec47075 100644 --- a/i18n/eo/passwords.md +++ b/i18n/eo/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/eo/productivity.md b/i18n/eo/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/eo/productivity.md +++ b/i18n/eo/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/eo/real-time-communication.md b/i18n/eo/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/eo/real-time-communication.md +++ b/i18n/eo/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/eo/router.md b/i18n/eo/router.md index a494c017..834c59f6 100644 --- a/i18n/eo/router.md +++ b/i18n/eo/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/eo/search-engines.md b/i18n/eo/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/eo/search-engines.md +++ b/i18n/eo/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/eo/tor.md b/i18n/eo/tor.md index 8142c1da..d27411a3 100644 --- a/i18n/eo/tor.md +++ b/i18n/eo/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/eo/video-streaming.md b/i18n/eo/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/eo/video-streaming.md +++ b/i18n/eo/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/eo/vpn.md b/i18n/eo/vpn.md index e281b025..28439285 100644 --- a/i18n/eo/vpn.md +++ b/i18n/eo/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/es/android.md b/i18n/es/android.md index cdc9e556..04857022 100644 --- a/i18n/es/android.md +++ b/i18n/es/android.md @@ -3,6 +3,7 @@ meta_title: "Recomendaciones Android: GrapheneOS y DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Puedes sustituir el sistema operativo de tu teléfono Android por estas alternativas seguras y respetuosas con la privacidad. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/es/calendar.md b/i18n/es/calendar.md index 2a104b00..28615118 100644 --- a/i18n/es/calendar.md +++ b/i18n/es/calendar.md @@ -2,6 +2,7 @@ title: "Sincronización de Calendario" icon: material/calendar description: Calendarios contienen algunos de tus datos más sensibles; usa productos que apliquen el cifrado en reposo. +cover: calendar.png --- Los calendarios contienen algunos de sus datos más sensibles; utilice productos que implementen E2EE en reposo para evitar que un proveedor pueda leerlos. diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index fa18ff9a..e0f97576 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -3,6 +3,7 @@ meta_title: "Los Mejores Proveedores de Almacenamiento en la Nube Privado y Segu title: "Almacenamiento en la Nube" icon: material/file-cloud description: Muchos proveedores de almacenamiento en la nube exigen que confíes plenamente en que no mirarán tus archivos. Estas son alternativas privadas. +cover: cloud.png --- Muchos proveedores de almacenamiento en la nube exigen que confíes plenamente en que no mirarán tus archivos. Las alternativas enumeradas a continuación eliminan la necesidad de confianza mediante la implementación de E2EE seguros. diff --git a/i18n/es/cryptocurrency.md b/i18n/es/cryptocurrency.md index 40a803fc..0d3730ef 100644 --- a/i18n/es/cryptocurrency.md +++ b/i18n/es/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Blockchains Privadas de Criptomonedas - Privacy Guides" title: Criptomonedas icon: material/bank-circle +cover: cryptocurrency.png --- Realizar pagos en línea es uno de los principales desafíos para la privacidad. Estas criptomonedas le brindan privacidad a sus transacciones (algo que **no** está garantizado por la mayoría de las criptomonedas), permitiéndole tener una alta comprensión de cómo hacer pagos privados correctamente. Le recomendamos encarecidamente que primero lea nuestro apartado de pagos antes de realizar cualquier compra: diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md index 2d6e13d0..cafd07a1 100644 --- a/i18n/es/data-redaction.md +++ b/i18n/es/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Eliminar PII con Depuradores de Metadatos y Herramientas de Edició title: "Redacción de Datos y Metadatos" icon: material/tag-remove description: Utiliza estas herramientas para eliminar metadatos como la ubicación GPS y otros datos identificativos de las fotos y archivos que compartas. +cover: data-redaction.png --- Cuando compartas archivos, asegúrate de remover los metadatos asociados. Archivos de imagen comúnmente incluyen datos [Exif](https://en.wikipedia.org/wiki/Exif). Fotos a veces incluyen hasta coordenadas GPS en los metadatos del archivo. diff --git a/i18n/es/desktop-browsers.md b/i18n/es/desktop-browsers.md index a6ecbb5a..a0adbdb3 100644 --- a/i18n/es/desktop-browsers.md +++ b/i18n/es/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Navegadores Web para PC y Mac que Respetan la Privacidad - Privacy title: "Navegadores de Escritorio" icon: material/laptop description: Estos navegadores web ofrecen protecciones de privacidad más sólidas que Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/es/desktop.md b/i18n/es/desktop.md index c120593b..6826ee0c 100644 --- a/i18n/es/desktop.md +++ b/i18n/es/desktop.md @@ -2,6 +2,7 @@ title: "Escritorio/PC" icon: simple/linux description: Las distribuciones de Linux se recomiendan comúnmente para la protección de la privacidad y la libertad del software. +cover: desktop.png --- Las distribuciones de Linux se recomiendan comúnmente para la protección de la privacidad y la libertad del software. Si aún no utiliza Linux, a continuación le sugerimos que pruebe algunas distribuciones, así como algunos consejos generales para mejorar la privacidad y la seguridad que son aplicables a muchas distribuciones de Linux. diff --git a/i18n/es/dns.md b/i18n/es/dns.md index 52944ca2..b36d9d7d 100644 --- a/i18n/es/dns.md +++ b/i18n/es/dns.md @@ -2,6 +2,7 @@ title: "Resolvedores de DNS" icon: material/dns description: Estos son algunos proveedores de DNS cifrado a los que recomendamos cambiar para reemplazar la configuración por defecto de tu proveedor de servicios de internet. +cover: dns.png --- Un DNS encriptado con servidores de terceros solo debe utilizarse para evitar el [bloqueo de DNS básico](https://en.wikipedia.org/wiki/DNS_blocking) cuándo puedas estar seguro de que no habrá ningunas consecuencias. Un DNS encriptado no te ayudará a esconder ninguna de tu actividad en línea. diff --git a/i18n/es/email-clients.md b/i18n/es/email-clients.md index 37722384..1936852e 100644 --- a/i18n/es/email-clients.md +++ b/i18n/es/email-clients.md @@ -2,6 +2,7 @@ title: "Clientes de Correo Electrónico" icon: material/email-open description: Estos clientes de correo electrónico respetan la privacidad y admiten el cifrado de correo electrónico OpenPGP. +cover: email-clients.png --- Nuestra lista de recomendaciones contiene clientes de correo electrónico que soportan [OpenPGP](encryption.md#openpgp) y una autenticación fuerte como [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth le permite utilizar la [Autenticación Multifactor](basics/multi-factor-authentication.md) y previene el robo de cuentas. diff --git a/i18n/es/email.md b/i18n/es/email.md index 9901ccdb..c95b21c2 100644 --- a/i18n/es/email.md +++ b/i18n/es/email.md @@ -3,6 +3,7 @@ meta_title: "Recomendaciones de Correo Electrónico Privado Cifrado - Privacy Gu title: "Servicios de Correo Electrónico" icon: material/email description: Estos proveedores de correo electrónico ofrecen un lugar estupendo para almacenar tus correos de forma segura, y muchos ofrecen encriptación OpenPGP inter operable con otros proveedores. +cover: email.png --- Correo electrónico es prácticamente una necesidad para utilizar cualquier servicio en línea, sin embargo, no lo recomendamos para las conversaciones de persona a persona. En vez de utilizar el correo electrónico para comunicarte con otras personas, considera utilizar un servicio de mensajería instantánea que soporte el secreto hacia adelante. diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index aa44e482..2dca3d83 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -3,6 +3,7 @@ meta_title: "Software de Cifrado Recomendado:: VeraCrypt, Cryptomator, PicoCrypt title: "Software de Cifrado" icon: material/file-lock description: El cifrado de los datos es la única forma de controlar quién puede acceder a ellos. Estas herramientas le permiten cifrar sus correos electrónicos y cualquier otro archivo. +cover: encryption.png --- El cifrado de los datos es la única forma de controlar quién puede acceder a ellos. Si actualmente no está utilizando software de cifrado para su disco duro, correos electrónicos o archivos, debería elegir una opción aquí. diff --git a/i18n/es/file-sharing.md b/i18n/es/file-sharing.md index a9a8e467..7906fc88 100644 --- a/i18n/es/file-sharing.md +++ b/i18n/es/file-sharing.md @@ -2,6 +2,7 @@ title: "Compartición y sincronización de archivos" icon: material/share-variant description: Descubra cómo puede compartir de manera privada sus archivos entre sus dispositivos, con sus amigos y familia, o de manera anónima en línea. +cover: file-sharing.png --- Descubra cómo puede compartir de manera privada sus archivos entre sus dispositivos, con sus amigos y familia, o de manera anónima en línea. diff --git a/i18n/es/financial-services.md b/i18n/es/financial-services.md index 710327ee..8ac6445b 100644 --- a/i18n/es/financial-services.md +++ b/i18n/es/financial-services.md @@ -1,6 +1,7 @@ --- title: Servicios Financieros icon: material/bank +cover: financial-services.png --- Realizar pagos en línea es uno de los principales desafíos para la privacidad. Estos servicios pueden ayudarle a proteger su privacidad frente a los comercios y otros rastreadores, siempre que conozca bien cómo realizar pagos privados de forma eficaz. Le recomendamos encarecidamente que primero lea nuestro apartado de pagos antes de realizar cualquier compra: diff --git a/i18n/es/frontends.md b/i18n/es/frontends.md index af631662..2fe79559 100644 --- a/i18n/es/frontends.md +++ b/i18n/es/frontends.md @@ -2,6 +2,7 @@ title: "Interfaces de usuario" icon: material/flip-to-front description: Estas interfaces de código abierto para diversos servicios de Internet le permiten acceder a los contenidos sin JavaScript ni otras molestias. +cover: frontends.png --- A veces, los servicios intentarán obligarle a registrarse mediante el bloqueo al acceso a los contenidos con molestas ventanas emergentes. También pueden fallar si no se activa JavaScript. Estas interfaces pueden permitirle eludir estas restricciones. diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index 074c2ed0..52136bfd 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Navegadores Móviles para Android e iOS que Respetan la Privacidad title: "Navegadores Móviles" icon: material/cellphone-information description: Estos navegadores son los que recomendamos actualmente para la navegación estándar/no anónima por Internet en su teléfono. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/es/multi-factor-authentication.md b/i18n/es/multi-factor-authentication.md index af43b577..f7fefa78 100644 --- a/i18n/es/multi-factor-authentication.md +++ b/i18n/es/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Autenticadores de Múltiples Factores" icon: 'material/two-factor-authentication' description: Estas herramientas le ayudan a proteger sus cuentas de Internet con la autenticación multifactor sin enviar sus secretos a terceros. +cover: multi-factor-authentication.png --- ## Llaves de Seguridad diff --git a/i18n/es/news-aggregators.md b/i18n/es/news-aggregators.md index e32aeb76..c346e4f8 100644 --- a/i18n/es/news-aggregators.md +++ b/i18n/es/news-aggregators.md @@ -2,6 +2,7 @@ title: "Lectores de noticias" icon: material/rss description: Estos clientes para la lectura de noticias le permiten estar al día con sus páginas de noticias favoritas, utilizando estándares de Internet como RSS. +cover: news-aggregators.png --- Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una manera de estar al día con sus páginas de noticias favoritas. diff --git a/i18n/es/notebooks.md b/i18n/es/notebooks.md index eb66e660..42a02484 100644 --- a/i18n/es/notebooks.md +++ b/i18n/es/notebooks.md @@ -2,6 +2,7 @@ title: "Blocs de Notas" icon: material/notebook-edit-outline description: Estas aplicaciones encriptadas para tomar notas te permiten hacer un seguimiento de tus apuntes sin cedérselos a terceros. +cover: notebooks.png --- Mantén el control de tus notas y diarios sin darlos a un tercero. diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index 6371879a..fdb190ec 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -3,6 +3,7 @@ meta_title: "Los Mejores Administradores de Contraseñas para Proteger su Privac title: "Administradores de Contraseñas" icon: material/form-textbox-password description: Los administradores de contraseñas le permiten almacenar y administrar de forma segura contraseñas y otras credenciales. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/es/productivity.md b/i18n/es/productivity.md index b9aa364c..64f6da35 100644 --- a/i18n/es/productivity.md +++ b/i18n/es/productivity.md @@ -2,6 +2,7 @@ title: "Herramientas de Productividad" icon: material/file-sign description: La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que significa que el proveedor de la nube tiene acceso a todo lo que usted hace. +cover: productivity.png --- La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que significa que el proveedor de la nube tiene acceso a todo lo que usted hace. La política de privacidad puede proteger legalmente sus derechos, pero no establece limitaciones técnicas de acceso. diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index 173a5158..f493c985 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "Los Mejores Servicios de Mensajería Instantánea - Privacy Guides" title: "Comunicación en Tiempo Real" icon: material/chat-processing description: Otros servicios de mensajería instantánea ponen todas sus conversaciones privadas a disposición de la empresa que los gestiona. +cover: real-time-communication.png --- Estas son nuestras recomendaciones para la comunicación cifrada en tiempo real. diff --git a/i18n/es/router.md b/i18n/es/router.md index 5797cdc5..65b8f6da 100644 --- a/i18n/es/router.md +++ b/i18n/es/router.md @@ -2,6 +2,7 @@ title: "Firmware del Router" icon: material/router-wireless description: Estos sistemas operativos alternativos pueden utilizarse para proteger tu router o punto de acceso Wi-Fi. +cover: router.png --- A continuación se presentan algunos sistemas operativos alternativos, que pueden utilizarse en routers, puntos de acceso Wi-Fi, etc. diff --git a/i18n/es/search-engines.md b/i18n/es/search-engines.md index ffd6d586..44593ce8 100644 --- a/i18n/es/search-engines.md +++ b/i18n/es/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Motores de Búsqueda Recomendados: Alternativas Anónimas a Google title: "Motores de Búsqueda" icon: material/search-web description: Estos motores de búsqueda respetuosos con la privacidad no construyen un perfil publicitario basado en sus búsquedas. +cover: search-engines.png --- Utilice un motor de búsqueda que no construya un perfil publicitario basado en sus búsquedas. diff --git a/i18n/es/tor.md b/i18n/es/tor.md index 983ed66d..38d9451d 100644 --- a/i18n/es/tor.md +++ b/i18n/es/tor.md @@ -3,6 +3,7 @@ meta_title: "Navegador y Red Tor: Navegación Web Anónima - Privacy Guides" title: "Red Tor" icon: simple/torproject description: Protege tu navegación por Internet de miradas intrusas utilizando la red Tor, una red segura que elude la censura. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/es/video-streaming.md b/i18n/es/video-streaming.md index c13f9d49..82320131 100644 --- a/i18n/es/video-streaming.md +++ b/i18n/es/video-streaming.md @@ -2,6 +2,7 @@ title: "Transmisiones en Vivo" icon: material/video-wireless description: Estas redes le permiten transmitir contenidos de Internet sin crear un perfil publicitario basado en sus intereses. +cover: video-streaming.png --- La principal amenaza al utilizar una plataforma de streaming es que sus hábitos de streaming y sus suscripciones podrían utilizarse para elaborar un perfil. Deberías combinar estas herramientas con un [VPN](vpn.md) o [Tor](https://www.torproject.org/) para hacer más difícil la recolección de tu perfil. diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md index 3d3a1a37..b2ee8a31 100644 --- a/i18n/es/vpn.md +++ b/i18n/es/vpn.md @@ -3,6 +3,7 @@ meta_title: "Recomendaciones y Comparación de Servicios VPN Privados, Sin Patro title: "Servicios de VPN" icon: material/vpn description: Estos son los mejores servicios VPN para proteger tu privacidad y seguridad en línea. Encuentra un proveedor aquí que no esté para espiarte. +cover: vpn.png --- Si buscas **privacidad** adicional de tu proveedor de servicios de internet, en una red wifi pública o mientras descargando archivos Torrent, una VPN puede ser la solución para ti, siempre y cuando entiendas los riesgos que conlleva. Creemos que estos proveedores están por encima de los demás: diff --git a/i18n/fa/android.md b/i18n/fa/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/fa/android.md +++ b/i18n/fa/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/fa/calendar.md b/i18n/fa/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/fa/calendar.md +++ b/i18n/fa/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md index a7309b33..0bbf1f93 100644 --- a/i18n/fa/cloud.md +++ b/i18n/fa/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/fa/cryptocurrency.md b/i18n/fa/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/fa/cryptocurrency.md +++ b/i18n/fa/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/fa/data-redaction.md b/i18n/fa/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/fa/data-redaction.md +++ b/i18n/fa/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/fa/desktop-browsers.md b/i18n/fa/desktop-browsers.md index c6b94ef8..5e35ce5f 100644 --- a/i18n/fa/desktop-browsers.md +++ b/i18n/fa/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/fa/desktop.md b/i18n/fa/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/fa/desktop.md +++ b/i18n/fa/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/fa/dns.md b/i18n/fa/dns.md index a8cc21da..18ec4ddd 100644 --- a/i18n/fa/dns.md +++ b/i18n/fa/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/fa/email-clients.md b/i18n/fa/email-clients.md index b9f5dd7d..28e9911d 100644 --- a/i18n/fa/email-clients.md +++ b/i18n/fa/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/fa/email.md b/i18n/fa/email.md index 43efeb41..1e82b075 100644 --- a/i18n/fa/email.md +++ b/i18n/fa/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/fa/encryption.md b/i18n/fa/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/fa/encryption.md +++ b/i18n/fa/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/fa/file-sharing.md b/i18n/fa/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/fa/file-sharing.md +++ b/i18n/fa/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/fa/financial-services.md b/i18n/fa/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/fa/financial-services.md +++ b/i18n/fa/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/fa/frontends.md b/i18n/fa/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/fa/frontends.md +++ b/i18n/fa/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/fa/mobile-browsers.md b/i18n/fa/mobile-browsers.md index c2ab1061..e6d35165 100644 --- a/i18n/fa/mobile-browsers.md +++ b/i18n/fa/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/fa/multi-factor-authentication.md b/i18n/fa/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/fa/multi-factor-authentication.md +++ b/i18n/fa/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/fa/news-aggregators.md b/i18n/fa/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/fa/news-aggregators.md +++ b/i18n/fa/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/fa/notebooks.md b/i18n/fa/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/fa/notebooks.md +++ b/i18n/fa/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/fa/passwords.md b/i18n/fa/passwords.md index 485231b1..2ec47075 100644 --- a/i18n/fa/passwords.md +++ b/i18n/fa/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/fa/productivity.md b/i18n/fa/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/fa/productivity.md +++ b/i18n/fa/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/fa/real-time-communication.md b/i18n/fa/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/fa/real-time-communication.md +++ b/i18n/fa/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/fa/router.md b/i18n/fa/router.md index a494c017..834c59f6 100644 --- a/i18n/fa/router.md +++ b/i18n/fa/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/fa/search-engines.md b/i18n/fa/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/fa/search-engines.md +++ b/i18n/fa/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/fa/tor.md b/i18n/fa/tor.md index 8142c1da..d27411a3 100644 --- a/i18n/fa/tor.md +++ b/i18n/fa/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/fa/video-streaming.md b/i18n/fa/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/fa/video-streaming.md +++ b/i18n/fa/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/fa/vpn.md b/i18n/fa/vpn.md index e281b025..28439285 100644 --- a/i18n/fa/vpn.md +++ b/i18n/fa/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/fr/android.md b/i18n/fr/android.md index 94c61cdb..0c552472 100644 --- a/i18n/fr/android.md +++ b/i18n/fr/android.md @@ -3,6 +3,7 @@ meta_title: "Recommandations Android : GrapheneOS et DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Vous pouvez remplacer le système d'exploitation de votre téléphone Android par ces alternatives sécurisées et respectueuses de la vie privée. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/fr/calendar.md b/i18n/fr/calendar.md index 1a90a26a..1377a9aa 100644 --- a/i18n/fr/calendar.md +++ b/i18n/fr/calendar.md @@ -2,6 +2,7 @@ title: "Synchronisation de calendrier" icon: material/calendar description: Les calendriers contiennent certaines de vos données les plus sensibles ; utilisez des produits qui implémentent le chiffrement au repos. +cover: calendar.png --- Les calendriers contiennent certaines de vos données les plus sensibles ; utilisez des produits qui mettent en œuvre l'E2EE au repos pour empêcher un fournisseur de les lire. diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index 90a3cc08..37e9e297 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -3,6 +3,7 @@ meta_title: "Les meilleurs services de stockage cloud privés et sécurisés - P title: "Stockage cloud" icon: material/file-cloud description: De nombreux fournisseurs de stockage cloud nécessitent que vous leur fassiez confiance pour ne pas consulter vos fichiers. Voici des alternatives privées ! +cover: cloud.png --- De nombreux fournisseurs de stockage cloud nécessitent que vous leur fassiez entièrement confiance pour ne pas consulter vos fichiers. Les alternatives énumérées ci-dessous éliminent le besoin de confiance en mettant en œuvre un E2EE sécurisé. diff --git a/i18n/fr/cryptocurrency.md b/i18n/fr/cryptocurrency.md index f49e4b19..d9ace73d 100644 --- a/i18n/fr/cryptocurrency.md +++ b/i18n/fr/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Chaînes de blocs de crypto-monnaies privées - Privacy Guides" title: Crypto-monnaie icon: material/bank-circle +cover: cryptocurrency.png --- Effectuer des paiements en ligne est l'un des plus grands défis en matière de protection de la vie privée. Ces crypto-monnaies garantissent par défaut la confidentialité des transactions (ce qui n'est **pas** garanti par la majorité des crypto-monnaies), à condition que vous ayez une bonne compréhension de la façon d'effectuer des paiements privés de manière efficace. Nous vous encourageons vivement à lire notre article sur les paiements avant d'effectuer tout achat : diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md index 8eea003b..0678230a 100644 --- a/i18n/fr/data-redaction.md +++ b/i18n/fr/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Supprimer les DCP à l'aide de nettoyeurs de métadonnées et d'out title: "Rédaction de données et de métadonnées" icon: material/tag-remove description: Utilisez ces outils pour supprimer les métadonnées telles que la position GPS et d'autres informations d'identification des photos et des fichiers que vous partagez. +cover: data-redaction.png --- Lorsque vous partagez des fichiers, veillez à supprimer les métadonnées associées. Les fichiers d'image comprennent généralement des données [Exif](https://en.wikipedia.org/wiki/Exif) . Les photos comportent parfois même des coordonnées GPS dans les métadonnées du fichier. diff --git a/i18n/fr/desktop-browsers.md b/i18n/fr/desktop-browsers.md index 22938d75..a2f73199 100644 --- a/i18n/fr/desktop-browsers.md +++ b/i18n/fr/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Navigateurs web respectueux de la vie privée pour PC et Mac - Priv title: "Navigateurs de bureau" icon: material/laptop description: Ces navigateurs web offrent des protections de la vie privée plus solides que Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/fr/desktop.md b/i18n/fr/desktop.md index 69a17a78..71dc2e63 100644 --- a/i18n/fr/desktop.md +++ b/i18n/fr/desktop.md @@ -2,6 +2,7 @@ title: "Bureau/PC" icon: simple/linux description: Les distributions Linux sont généralement recommandées pour la protection de la vie privée et la liberté logicielle. +cover: desktop.png --- Les distributions Linux sont généralement recommandées pour la protection de la vie privée et la liberté logicielle. Si vous n'utilisez pas encore Linux, vous trouverez ci-dessous quelques distributions que nous vous suggérons d'essayer, ainsi que des conseils généraux d'amélioration de la sécurité et de la confidentialité qui s'appliquent à de nombreuses distributions Linux. diff --git a/i18n/fr/dns.md b/i18n/fr/dns.md index 3e729928..46f3db22 100644 --- a/i18n/fr/dns.md +++ b/i18n/fr/dns.md @@ -2,6 +2,7 @@ title: "Résolveurs DNS" icon: material/dns description: Voici quelques fournisseurs de DNS chiffrés que nous vous recommandons d'utiliser pour remplacer la configuration par défaut de votre FAI. +cover: dns.png --- Les DNS chiffrés avec des serveurs tiers ne doivent être utilisés que pour contourner le [blocage DNS](https://en.wikipedia.org/wiki/DNS_blocking) de base lorsque vous pouvez être sûr qu'il n'y aura pas de conséquences. Le DNS chiffré ne vous aidera pas à dissimuler vos activités de navigation. diff --git a/i18n/fr/email-clients.md b/i18n/fr/email-clients.md index 8ce29576..0c507e42 100644 --- a/i18n/fr/email-clients.md +++ b/i18n/fr/email-clients.md @@ -2,6 +2,7 @@ title: "Logiciels de messagerie électronique" icon: material/email-open description: Ces clients d'email respectent la vie privée et prennent en charge le chiffrement OpenPGP. +cover: email-clients.png --- Notre liste de recommandations contient des clients de messagerie qui prennent en charge à la fois [OpenPGP](encryption.md#openpgp) et l'authentification forte telle que [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth vous permet d'utiliser l'[Authentification à Multi-Facteurs](multi-factor-authentication) et d'empêcher le vol de compte. diff --git a/i18n/fr/email.md b/i18n/fr/email.md index afdbf89e..27154977 100644 --- a/i18n/fr/email.md +++ b/i18n/fr/email.md @@ -3,6 +3,7 @@ meta_title: "Recommandations de fournisseurs d'email privés et chiffrés - Priv title: "Services d'email" icon: material/email description: Ces fournisseurs d'email constituent un excellent moyen de stocker vos emails en toute sécurité, et nombre d'entre eux proposent un système de chiffrement OpenPGP interopérable avec d'autres fournisseurs. +cover: email.png --- L'email est pratiquement une nécessité pour utiliser n'importe quel service en ligne, mais nous ne le recommandons pas pour les conversations de particulier à particulier. Plutôt que d'utiliser l'email pour contacter d'autres personnes, envisagez d'utiliser un support de messagerie instantanée qui prend en charge la confidentialité persistante. diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index 8385cfcf..55aeb037 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -3,6 +3,7 @@ meta_title: "Logiciels de chiffrement recommandés : VeraCrypt, Cryptomator, Pic title: "Logiciels de chiffrement" icon: material/file-lock description: Le chiffrement des données est le seul moyen de contrôler qui peut y accéder. Ces outils vous permettent de chiffrer vos emails et tout autre fichier. +cover: encryption.png --- Le chiffrement des données est le seul moyen de contrôler qui peut y accéder. Si vous n'utilisez pas actuellement de logiciel de chiffrement pour votre disque dur, vos e-mails ou vos fichiers, vous devriez choisir une option ici. diff --git a/i18n/fr/file-sharing.md b/i18n/fr/file-sharing.md index 35afc507..d245c187 100644 --- a/i18n/fr/file-sharing.md +++ b/i18n/fr/file-sharing.md @@ -2,6 +2,7 @@ title: "Partage et synchronisation de fichiers" icon: material/share-variant description: Découvrez comment partager vos fichiers en toute confidentialité entre vos appareils, avec vos amis et votre famille, ou de manière anonyme en ligne. +cover: file-sharing.png --- Découvrez comment partager vos fichiers en toute confidentialité entre vos appareils, avec vos amis et votre famille, ou de manière anonyme en ligne. diff --git a/i18n/fr/financial-services.md b/i18n/fr/financial-services.md index bda6cde8..a1dd2112 100644 --- a/i18n/fr/financial-services.md +++ b/i18n/fr/financial-services.md @@ -1,6 +1,7 @@ --- title: Services financiers icon: material/bank +cover: financial-services.png --- Effectuer des paiements en ligne est l'un des plus grands défis en matière de protection de la vie privée. Ces services peuvent vous aider à protéger votre vie privée contre les marchands et autres traqueurs, à condition que vous ayez une bonne compréhension de la façon d'effectuer des paiements privés de manière efficace. Nous vous encourageons vivement à lire notre article sur les paiements avant d'effectuer tout achat : @@ -74,9 +75,9 @@ Ces services vous permettent d'acheter des cartes-cadeaux pour une variété de !!! recommendation - ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } + ![Logo CakePay](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (disponible aux États-Unis, au Canada et au Royaume-Uni) vous permet d'acheter des cartes-cadeaux auprès d'un grand nombre de commerçants. [:octicons-home-16: Page d'accueil](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Politique de confidentialité" } diff --git a/i18n/fr/frontends.md b/i18n/fr/frontends.md index 1e24dce2..2224d7a4 100644 --- a/i18n/fr/frontends.md +++ b/i18n/fr/frontends.md @@ -2,6 +2,7 @@ title: "Clients applicatifs" icon: material/flip-to-front description: Ces clients applicatifs open source pour divers services internet vous permettent d'accéder au contenu sans JavaScript ou d'autres inconvénients. +cover: frontends.png --- Parfois, des services tentent de vous obliger à créer un compte en bloquant l'accès au contenu par des fenêtres pop-up gênantes. Ils peuvent également ne pas fonctionner sans JavaScript activé. Ces interfaces client peuvent vous permettre de contourner ces restrictions. diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md index 44efe66c..d3fd282d 100644 --- a/i18n/fr/mobile-browsers.md +++ b/i18n/fr/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Navigateurs web respectueux de la vie privée pour Android et iOS - title: "Navigateurs mobiles" icon: material/cellphone-information description: Ces navigateurs sont ceux que nous recommandons actuellement pour la navigation internet standard/non anonyme sur votre téléphone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/fr/multi-factor-authentication.md b/i18n/fr/multi-factor-authentication.md index 02dd72a8..40a98040 100644 --- a/i18n/fr/multi-factor-authentication.md +++ b/i18n/fr/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Outils d'authentification multi-facteurs" icon: 'material/two-factor-authentication' description: Ces outils vous aident à sécuriser vos comptes internet grâce à l'authentification multifactorielle sans transmettre vos secrets à un tiers. +cover: multi-factor-authentication.png --- ## Clés de sécurité matérielles diff --git a/i18n/fr/news-aggregators.md b/i18n/fr/news-aggregators.md index ecbf72c6..9f4ab82d 100644 --- a/i18n/fr/news-aggregators.md +++ b/i18n/fr/news-aggregators.md @@ -2,6 +2,7 @@ title: "Agrégateurs d'actualités" icon: material/rss description: Ces clients agrégateurs d'actualités vous permettent de suivre vos blogs et sites d'information préférés en utilisant des normes internet telles que RSS. +cover: news-aggregators.png --- Un [agrégateur d'actualités](https://en.wikipedia.org/wiki/News_aggregator) est un moyen de suivre vos blogs et sites d'actualités préférés. diff --git a/i18n/fr/notebooks.md b/i18n/fr/notebooks.md index 16a63b63..101db99e 100644 --- a/i18n/fr/notebooks.md +++ b/i18n/fr/notebooks.md @@ -2,6 +2,7 @@ title: "Bloc-notes" icon: material/notebook-edit-outline description: Ces applications de prise de notes chiffrées vous permettent de garder une trace de vos notes sans les transmettre à un tiers. +cover: notebooks.png --- Gardez une trace de vos notes et de vos journaux sans les donner à un tiers. diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index e12313d5..197e6a30 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -3,6 +3,7 @@ meta_title: "Les meilleurs gestionnaires de mots de passe pour protéger votre v title: "Gestionnaires de mots de passe" icon: material/form-textbox-password description: Les gestionnaires de mots de passe vous permettent de stocker et de gérer en toute sécurité des mots de passe et autres informations d'identification. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/fr/productivity.md b/i18n/fr/productivity.md index e4f01b4a..d7bf1579 100644 --- a/i18n/fr/productivity.md +++ b/i18n/fr/productivity.md @@ -2,6 +2,7 @@ title: "Outils de productivité" icon: material/file-sign description: La plupart des suites bureautiques en ligne ne prennent pas en charge l'E2EE, ce qui signifie que le fournisseur de cloud a accès à tout ce que vous faites. +cover: productivity.png --- La plupart des suites bureautiques en ligne ne prennent pas en charge l'E2EE, ce qui signifie que le fournisseur de cloud a accès à tout ce que vous faites. La politique de confidentialité peut protéger légalement vos droits, mais elle ne fournit pas de contraintes techniques d'accès. diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index a5e3fb9a..db05fbd9 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "Les meilleures messageries instantanées privées - Privacy Guides" title: "Communication en temps réel" icon: material/chat-processing description: Les autres messageries instantanées mettent toutes vos conversations privées à la disposition de la société qui les gère. +cover: real-time-communication.png --- Voici nos recommandations pour de la communication en temps réel chiffrée. diff --git a/i18n/fr/router.md b/i18n/fr/router.md index a4eeba72..eb5fa371 100644 --- a/i18n/fr/router.md +++ b/i18n/fr/router.md @@ -2,6 +2,7 @@ title: "Micrologiciel de routeur" icon: material/router-wireless description: Ces systèmes d'exploitation alternatifs peuvent être utilisés pour sécuriser votre routeur ou votre point d'accès Wi-Fi. +cover: router.png --- Vous trouverez ci-dessous quelques systèmes d'exploitation alternatifs, qui peuvent être utilisés sur des routeurs, des points d'accès Wi-Fi, etc. diff --git a/i18n/fr/search-engines.md b/i18n/fr/search-engines.md index ec68739a..734e237d 100644 --- a/i18n/fr/search-engines.md +++ b/i18n/fr/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Moteurs de recherche recommandés : alternatives anonymes à Google title: "Moteurs de recherche" icon: material/search-web description: Ces moteurs de recherche respectueux de la vie privée n'établissent pas de profil publicitaire sur la base de vos recherches. +cover: search-engines.png --- Utilisez un moteur de recherche qui ne construit pas un profil publicitaire en fonction de vos recherches. diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md index 07b7d25a..b64dfdf9 100644 --- a/i18n/fr/tor.md +++ b/i18n/fr/tor.md @@ -3,6 +3,7 @@ meta_title: "Navigateur et réseau Tor : navigation web anonyme - Privacy Guides title: "Réseau Tor" icon: simple/torproject description: Protégez votre navigation sur internet des regards indiscrets en utilisant le réseau Tor, un réseau sécurisé qui contourne la censure. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/fr/video-streaming.md b/i18n/fr/video-streaming.md index 51ad22f6..f9623c00 100644 --- a/i18n/fr/video-streaming.md +++ b/i18n/fr/video-streaming.md @@ -2,6 +2,7 @@ title: "Streaming vidéo" icon: material/video-wireless description: Ces réseaux vous permettent de consommer du contenu internet sans établir de profil publicitaire basé sur vos centres d'intérêt. +cover: video-streaming.png --- La principale menace liée à l'utilisation d'une plateforme de streaming vidéo est que vos habitudes de streaming et vos listes d'abonnement pourraient être utilisées pour établir votre profil. Vous devriez combiner ces outils avec un [VPN](vpn.md) ou [Tor](https://www.torproject.org/) pour rendre plus difficile le profilage de votre utilisation. diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md index 09f1d05b..fcc0afae 100644 --- a/i18n/fr/vpn.md +++ b/i18n/fr/vpn.md @@ -3,6 +3,7 @@ meta_title: "Recommandations et comparaison de services VPN privés, sans sponso title: "Services VPN" icon: material/vpn description: Voici les meilleurs services VPN pour protéger votre vie privée et votre sécurité en ligne. Trouvez ici un fournisseur qui ne cherche pas à vous espionner. +cover: vpn.png --- Si vous recherchez à protéger votre **vie privée** vis-à-vis de votre FAI, sur un réseau Wi-Fi public ou lorsque vous téléchargez des fichiers en torrent, un VPN peut être la solution pour vous, à condition que vous compreniez les risques encourus. Nous pensons que ces fournisseurs se distinguent des autres : diff --git a/i18n/he/about/criteria.md b/i18n/he/about/criteria.md index 9cc91101..9d538441 100644 --- a/i18n/he/about/criteria.md +++ b/i18n/he/about/criteria.md @@ -29,7 +29,7 @@ title: קריטריונים כלליים - חייב לחשוף את ההשתייכות, כלומר את עמדתך בפרויקט המוגש. -- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc. +- חייב להיות מסמך לבן אבטחה אם מדובר בפרויקט הכולל טיפול במידע רגיש כמו מסנג'ר, מנהל סיסמאות, אחסון מוצפן בענן וכו'. - סטטוס ביקורת של צד שלישי. אנחנו רוצים לדעת אם יש לך אחד, או שיש לך אחד מתוכנן. במידת האפשר נא לציין מי יבצע את הביקורת. - חייב להסביר מה הפרויקט מביא לשולחן בכל הנוגע לפרטיות. diff --git a/i18n/he/about/donate.md b/i18n/he/about/donate.md index fd3ad95c..4311bc94 100644 --- a/i18n/he/about/donate.md +++ b/i18n/he/about/donate.md @@ -7,7 +7,7 @@ title: תמיכה בנו אם אתה רוצה לתמוך בנו כלכלית, השיטה הנוחה ביותר עבורנו היא תרומה באמצעות Open Collective, אתר אינטרנט המופעל על ידי המארח הפיסקאלי שלנו. Open Collective מקבל תשלומים באמצעות כרטיס אשראי/חיוב, PayPal והעברות בנקאיות. -[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" } +[תרום ב- OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" } תרומות שנעשו ישירות אלינו ב-Open Collective ניתנות לניכוי מס בדרך כלל בארה"ב, מכיוון שהמארח הפיסקאלי שלנו (The Open Collective Foundation) הוא ארגון רשום 501(c)3. לאחר התרומה תקבלו קבלה מקרן הקולקטיב הפתוח. Privacy Guides אינם מספקים ייעוץ פיננסי, ועליכם ליצור קשר עם יועץ המס שלכם כדי לברר אם זה חל עליכם. diff --git a/i18n/he/about/services.md b/i18n/he/about/services.md index f03abfc7..607c5023 100644 --- a/i18n/he/about/services.md +++ b/i18n/he/about/services.md @@ -2,7 +2,7 @@ אנו מפעילים מספר שירותי אינטרנט כדי לבדוק תכונות ולקדם פרויקטים מגניבים מבוזרים, מאוחדים ו/או בקוד פתוח. רבים מהשירותים הללו זמינים לציבור והם מפורטים להלן. -[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" } +[:material-comment-alert: דווח על בעיה](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" } ## Discourse diff --git a/i18n/he/advanced/dns-overview.md b/i18n/he/advanced/dns-overview.md index a6abf1e2..9a83088c 100644 --- a/i18n/he/advanced/dns-overview.md +++ b/i18n/he/advanced/dns-overview.md @@ -24,7 +24,7 @@ DNS קיים מאז [הימים הראשונים](https://en.wikipedia.org/wiki/ tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 ``` -2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS, etc.) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. תוכנות כגון דפדפני אינטרנט מבצעות חיפושים אלו באופן אוטומטי, אלא אם כן הם מוגדרים לשימוש ב-DNS מוצפן. +2. לאחר מכן נוכל להשתמש ב[`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS וכו') או [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) כדי לשלוח את בדיקת ה-DNS לשני השרתים. תוכנות כגון דפדפני אינטרנט מבצעות חיפושים אלו באופן אוטומטי, אלא אם כן הם מוגדרים לשימוש ב-DNS מוצפן. === "לינוקס, macOS" @@ -118,7 +118,7 @@ DNS מוצפן יכול להתייחס לאחד ממספר פרוטוקולים, הדרך הפשוטה ביותר לקבוע את פעילות הגלישה עשויה להיות להסתכל על כתובות ה-IP שהמכשירים שלך ניגשים אליהם. לדוגמה, אם הצופה יודע ש-`privacyguides.org` נמצא בכתובת `198.98.54.105`, והמכשיר שלך מבקש נתונים מ-`198.98.54.105`, יש יש סיכוי טוב שאתה מבקר בPrivacy Guides. -שיטה זו שימושית רק כאשר כתובת ה-IP שייכת לשרת המארח רק מעט אתרים. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). זה גם לא מאוד שימושי אם השרת מתארח מאחורי [פרוקסי הפוך](https://en.wikipedia.org/wiki/Reverse_proxy), הנפוץ מאוד באינטרנט המודרני. +שיטה זו שימושית רק כאשר כתובת ה-IP שייכת לשרת המארח רק מעט אתרים. זה גם לא מאוד שימושי אם האתר מתארח בפלטפורמה משותפת (למשל Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger וכו'). זה גם לא מאוד שימושי אם השרת מתארח מאחורי [פרוקסי הפוך](https://en.wikipedia.org/wiki/Reverse_proxy), הנפוץ מאוד באינטרנט המודרני. ### ציון שם השרת (SNI) diff --git a/i18n/he/android.md b/i18n/he/android.md index 3d50ccd1..1d5c956c 100644 --- a/i18n/he/android.md +++ b/i18n/he/android.md @@ -1,8 +1,9 @@ --- -meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" +meta_title: "המלצות אנדרואיד: GrapheneOS ו-DivestOS - מדריכי פרטיות" title: "אנדרואיד" icon: 'simple/android' description: אתה יכול להחליף את מערכת ההפעלה בטלפון האנדרואיד שלך בחלופות מאובטחות ומכבדות פרטיות אלה. +cover: android.png schema: - "@context": http://schema.org @@ -222,10 +223,10 @@ DivestOS משתמשת ב-F-Droid כחנות האפליקציות המוגדרת !!! recommendation - ![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right } - ![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right } + ![Auditor לוגו](assets/img/android/auditor.svg#only-light){ align=right } + ![Auditor לוגו](assets/img/android/auditor-dark.svg#only-dark){ align=right } - **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support). + **Auditor** היא אפליקציה הממנפת תכונות אבטחת חומרה כדי לספק ניטור שלמות המכשיר על ידי אימות אקטיבי של זהות המכשיר ושלמות מערכת ההפעלה שלו. נכון לעכשיו, זה עובד רק עם GrapheneOS או מערכת ההפעלה המניות עבור [מכשירים נתמכים](https://attestation.app/about#device-support). [:octicons-home-16: דף הבית](https://attestation.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="מדיניות פרטיות" } diff --git a/i18n/he/basics/email-security.md b/i18n/he/basics/email-security.md index 710e3522..8766fec7 100644 --- a/i18n/he/basics/email-security.md +++ b/i18n/he/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "מדוע אימייל אינו הבחירה הטובה ביותר לפרטיות ואבטחה - Privacy Guides" title: אבטחת אימייל icon: material/email description: אימייל הוא מטבעו לא מאובטח במובנים רבים, ואלה חלק מהסיבות שהוא לא הבחירה המובילה שלנו לתקשורת מאובטחת. @@ -23,7 +23,7 @@ description: אימייל הוא מטבעו לא מאובטח במובנים ר ### כיצד אוכל להגן על המפתחות הפרטיים שלי? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. לאחר מכן, ההודעה מפוענחת על ידי הכרטיס החכם והתוכן המפוענח נשלח חזרה למכשיר. +כרטיס חכם (כגון [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) עובד על ידי קבלת הודעת אימייל מוצפנת ממכשיר (טלפון, טאבלט, מחשב וכו') המריץ לקוח אימייל/מייל אינטרנט. לאחר מכן, ההודעה מפוענחת על ידי הכרטיס החכם והתוכן המפוענח נשלח חזרה למכשיר. כדאי שהפענוח יתרחש בכרטיס החכם כדי להימנע מחשיפת המפתח הפרטי שלך למכשיר פגום. diff --git a/i18n/he/basics/multi-factor-authentication.md b/i18n/he/basics/multi-factor-authentication.md index 1aa17aa9..a9ffd2b4 100644 --- a/i18n/he/basics/multi-factor-authentication.md +++ b/i18n/he/basics/multi-factor-authentication.md @@ -120,7 +120,7 @@ WebAuthn היא הצורה המאובטחת והפרטית ביותר של אי מעבר לאבטחת כניסות האתר שלך בלבד, ניתן להשתמש באימות רב-גורמי כדי לאבטח את כניסותיך המקומיות, מפתחות SSH או אפילו מסדי נתונים של סיסמאות. -### Windows +### ווינדוס לYubico יש ספק [אישורים ייעודי](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) שמוסיף אימות Challenge-Response עבור זרימת הכניסה לשם משתמש + סיסמה עבור חשבונות Windows מקומיים. אם יש לך YubiKey עם תמיכה באימות Challenge-Response, עיין במדריך התצורה של [Yubico Login for Windows](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), שיאפשר לך להגדיר MFA במחשב Windows שלך. diff --git a/i18n/he/basics/threat-modeling.md b/i18n/he/basics/threat-modeling.md index df37b71e..60ec1e1f 100644 --- a/i18n/he/basics/threat-modeling.md +++ b/i18n/he/basics/threat-modeling.md @@ -1,11 +1,11 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" +meta_title: "דוגמנות איומים: הצעד הראשון במסע הפרטיות שלך - Privacy Guides" title: "מודל איומים" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: איזון בין אבטחה, פרטיות ושימושיות היא אחת המשימות הראשונות והקשות שתתמודדו איתם במסע הפרטיות שלכם. --- -Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. הכל הוא פשרה: ככל שמשהו בטוח יותר, כך הוא בדרך כלל מגביל או לא נוח יותר, וכו'. לעתים קרובות, אנשים מגלים שהבעיה בכלים שהם רואים מומלצים היא שפשוט קשה מדי להתחיל להשתמש בהם! +איזון בין אבטחה, פרטיות ושימושיות היא אחת המשימות הראשונות והקשות שתתמודדו איתם במסע הפרטיות שלכם. הכל הוא פשרה: ככל שמשהו בטוח יותר, כך הוא בדרך כלל מגביל או לא נוח יותר, וכו'. לעתים קרובות, אנשים מגלים שהבעיה בכלים שהם רואים מומלצים היא שפשוט קשה מדי להתחיל להשתמש בהם! אם תרצה להשתמש ב**רוב** הכלים המאובטחים הזמינים, תצטרך להקריב *הרבה* שימושיות. וגם אז, ==אין דבר שמאובטח תמיד לחלוטין.== יש אבטחה **גבוהה**, אך לעולם לא אבטחה **מלאה**. לכן מודלים של איומים חשובים. diff --git a/i18n/he/basics/vpn-overview.md b/i18n/he/basics/vpn-overview.md index 8e9b7855..257b3b40 100644 --- a/i18n/he/basics/vpn-overview.md +++ b/i18n/he/basics/vpn-overview.md @@ -1,5 +1,5 @@ --- -meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides" +meta_title: "כיצד VPNs מגנים על הפרטיות שלך? סקירת ה-VPN שלנו -Privacy Guides" title: סקירה כללית של VPN icon: material/vpn description: רשתות וירטואליות פרטיות מעבירות את הסיכון מספק שירותי האינטרנט שלך לצד שלישי שאתה סומך עליו. כדאי לזכור את הדברים האלה. @@ -49,7 +49,7 @@ VPNs אינם יכולים להצפין נתונים מחוץ לחיבור בי ## מה לגבי ספקי VPN המספקים צמתי Tor? -אל תשתמש בתכונה זו. הנקודה בשימוש ב-Tor היא שאינך סומך על ספק ה-VPN שלך. נכון לעכשיו Tor תומך רק בפרוטוקול [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol). [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. כדי לפצות על כך, ספקי VPN בדרך כלל ינתבו את כל החבילות שאינן TCP דרך שרת ה-VPN שלהם (הקפיצה הראשונה שלך). זה המקרה עם [ProtonVPN](https://protonvpn.com/support/tor-vpn/). בנוסף, בעת שימוש בהגדרת Tor over VPN זו, אין לך שליטה על תכונות Tor חשובות אחרות כגון [כתובת יעד מבודדת](https://www.whonix.org/wiki/Stream_Isolation) (באמצעות מעגל Tor שונה עבור כל דומיין שאתה מבקר בו). +אל תשתמש בתכונה זו. הנקודה בשימוש ב-Tor היא שאינך סומך על ספק ה-VPN שלך. נכון לעכשיו Tor תומך רק בפרוטוקול [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol). [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (בשימוש [WebRTC](https://en.wikipedia.org/wiki/WebRTC) לשיתוף קול ווידאו, פרוטוקול [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) החדש וכו'), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) ומנות אחרות יוסרו. כדי לפצות על כך, ספקי VPN בדרך כלל ינתבו את כל החבילות שאינן TCP דרך שרת ה-VPN שלהם (הקפיצה הראשונה שלך). זה המקרה עם [ProtonVPN](https://protonvpn.com/support/tor-vpn/). בנוסף, בעת שימוש בהגדרת Tor over VPN זו, אין לך שליטה על תכונות Tor חשובות אחרות כגון [כתובת יעד מבודדת](https://www.whonix.org/wiki/Stream_Isolation) (באמצעות מעגל Tor שונה עבור כל דומיין שאתה מבקר בו). יש לראות את התכונה כדרך נוחה לגשת לרשת Tor, לא להישאר אנונימית. לאנונימיות נאותה, השתמש בדפדפן Tor, TorSocks או שער Tor. diff --git a/i18n/he/calendar.md b/i18n/he/calendar.md index 8fe2b47f..309b6d3b 100644 --- a/i18n/he/calendar.md +++ b/i18n/he/calendar.md @@ -2,6 +2,7 @@ title: "סנכרון לוח שנה" icon: material/calendar description: לוחות שנה מכילים חלק מהנתונים הרגישים ביותר שלך; השתמש במוצרים המטמיעים הצפנה במנוחה. +cover: calendar.png --- לוחות שנה מכילים חלק מהנתונים הרגישים ביותר שלך; השתמש במוצרים המיישמים E2EE ב - מנוחה כדי למנוע מספק לקרוא אותם. diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md index b5fff462..824ffe7e 100644 --- a/i18n/he/cloud.md +++ b/i18n/he/cloud.md @@ -1,8 +1,9 @@ --- -meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides" +meta_title: "ספקי אחסון הענן הפרטיים והמאובטחים הטובים ביותר - Privacy Guides" title: "אחסון בענן" icon: material/file-cloud description: ספקי אחסון בענן רבים דורשים את האמון שלך שהם לא יסתכלו על הקבצים שלך. אלו חלופות פרטיות! +cover: cloud.png --- ספקי אחסון ענן רבים דורשים את האמון המלא שלך בכך שהם לא יסתכלו על הקבצים שלך. החלופות המפורטות להלן מבטלות את הצורך באמון על ידי הטמעת E2EE מאובטחת. @@ -21,10 +22,10 @@ description: ספקי אחסון בענן רבים דורשים את האמון **Proton Drive** הוא ספק אחסון ענן מוצפן שוויצרי מספק האימייל המוצפן הפופולרי [Proton Mail](email.md#proton-mail). - [:octicons-home-16: Homepage](https://proton.me/drive){ class="md-button md-button--primary" } - [:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" } + [:octicons-home-16: דף הבית](https://proton.me/drive){ class="md-button md-button--primary" } + [:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="מדיניות פרטיות" } + [:octicons-info-16:](https://proton.me/support/drive){ .card-link title=תיעוד} + [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="קוד מקור" } ??? downloads "הורדות" @@ -45,9 +46,9 @@ description: ספקי אחסון בענן רבים דורשים את האמון **Tresorit** היא ספקית אחסון ענן מוצפנת הונגרית שנוסדה ב-2011. Tresorit נמצאת בבעלות ה-Swiss Post, שירות הדואר הלאומי של שוויץ. - [:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } - [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} + [:octicons-home-16: דף הבית](https://tresorit.com/){ class="md-button md-button--primary" } + [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="מדיניות פרטיות" } + [:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=תיעוד} ??? downloads "הורדות" diff --git a/i18n/he/cryptocurrency.md b/i18n/he/cryptocurrency.md index 730cd92b..ea996f82 100644 --- a/i18n/he/cryptocurrency.md +++ b/i18n/he/cryptocurrency.md @@ -1,7 +1,8 @@ --- -meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" +meta_title: "בלוקצ'יין פרטי של מטבעות קריפטו - Privacy Guides" title: מטבעות קריפטוגרפיים icon: material/bank-circle +cover: cryptocurrency.png --- ביצוע תשלומים אונליין הוא אחד האתגרים הגדולים ביותר לפרטיות. מטבעות קריפטוגרפיים אלו מספקים פרטיות עסקאות כברירת מחדל (דבר ש**לא** מובטח על ידי רוב מטבעות הקריפטו), בתנאי שיש לך הבנה טובה כיצד לבצע תשלומים פרטיים ביעילות. אנו ממליצים בחום שתקרא תחילה את מאמר סקירת התשלומים שלנו לפני ביצוע רכישות כלשהן: diff --git a/i18n/he/data-redaction.md b/i18n/he/data-redaction.md index 880e5d23..4c085657 100644 --- a/i18n/he/data-redaction.md +++ b/i18n/he/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "הפחתת נתונים ומטא נתונים" icon: material/tag-remove description: השתמש בכלים אלה כדי להסיר מטא נתונים כמו מיקום GPS ומידע מזהה אחר מתמונות וקבצים שאתה משתף. +cover: data-redaction.png --- בעת שיתוף קבצים, הקפד להסיר מטא נתונים משויכים. קבצי תמונה כוללים בדרך כלל [נתוני Exif](https://en.wikipedia.org/wiki/Exif). תמונות לפעמים אפילו כוללות קואורדינטות GPS במטא-נתונים של הקובץ. diff --git a/i18n/he/desktop-browsers.md b/i18n/he/desktop-browsers.md index 09f10d7f..f22ed599 100644 --- a/i18n/he/desktop-browsers.md +++ b/i18n/he/desktop-browsers.md @@ -1,8 +1,9 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "דפדפני אינטרנט המכבדים פרטיות עבור מחשב ו-מק - Privacy Guides" title: "דפדפנים שולחניים" icon: material/laptop -description: These web browsers provide stronger privacy protections than Google Chrome. +description: דפדפני אינטרנט אלה מספקים הגנת פרטיות חזקה יותר מאשר Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org @@ -18,7 +19,7 @@ schema: url: https://mullvad.net/en/browser applicationCategory: Web Browser operatingSystem: - - Windows + - ווינדוס - macOS - לינוקס subjectOf: @@ -30,10 +31,10 @@ schema: name: Firefox image: /assets/img/browsers/firefox.svg url: https://firefox.com - sameAs: https://en.wikipedia.org/wiki/Firefox + sameAs: https://he.wikipedia.org/wiki/Firefox applicationCategory: Web Browser operatingSystem: - - Windows + - ווינדוס - macOS - לינוקס subjectOf: @@ -48,7 +49,7 @@ schema: sameAs: https://en.wikipedia.org/wiki/Brave_(web_browser) applicationCategory: Web Browser operatingSystem: - - Windows + - ווינדוס - macOS - לינוקס subjectOf: @@ -56,50 +57,50 @@ schema: url: "./" --- -אלה הדפדפנים והתצורות המומלצים כרגע לגלישה רגילה/לא אנונימית. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility. +אלה הדפדפנים והתצורות המומלצים כרגע לגלישה רגילה/לא אנונימית. אנו ממליצים על [Mullvad Browser](#mullvad-browser) אם אתה מתמקד בהגנת פרטיות חזקה ואנטי-טביעת אצבע מהקופסה, [Firefox](#firefox) עבור דפדפני אינטרנט מזדמנים המחפשים אלטרנטיבה טובה ל-Google Chrome, ו-[Brave](#brave) אם אתה צריך תאימות לדפדפן Chromium. -אם אתה צריך לגלוש באינטרנט באופן אנונימי, אתה צריך להשתמש [Tor](tor.md) במקום. We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another. +אם אתה צריך לגלוש באינטרנט באופן אנונימי, אתה צריך להשתמש [Tor](tor.md) במקום. אנו מציעים כמה המלצות תצורה בדף זה, אך כל הדפדפנים מלבד דפדפן Tor יהיו ניתנים למעקב על ידי *מישהו* בצורה כזו או אחרת. -## Mullvad Browser +## דפדפן Mullvad !!! recommendation - ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ align=right } + ![Mullvad Browser לוגו](assets/img/browsers/mullvad_browser.svg){ align=right } - **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. + **Mullvad Browser** הוא גרסה של [דפדפן Tor](tor.md#tor-browser) עם שילובי רשת Tor שהוסרו, שמטרתה לספק את טכנולוגיות הדפדפן נגד טביעת אצבע של Tor Browser למשתמשי VPN. הוא פותח על ידי Tor Project ומופץ על ידי [Mullvad](vpn.md#mullvad), ו**לא** דורש שימוש ב-VPN של Mullvad. - [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} - [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" } + [:octicons-home-16: דף הבית](https://mullvad.net/en/browser){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="מדיניות פרטיות" } + [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=תיעוד} + [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="קוד מקןר" } - ??? downloads + ??? downloads "הורדות" - - [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows) - - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) - - [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux) + - [:simple-windows11: ווינדוס](https://mullvad.net/en/download/browser/windows) + - [:simple-apple: מאק](https://mullvad.net/en/download/browser/macos) + - [:simple-linux: לינקוס](https://mullvad.net/en/download/browser/linux) -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +בדומה ל[דפדפן תור](tor.md), Mullvad Browser נועד למנוע טביעת אצבע על ידי הפיכת טביעת האצבע של הדפדפן שלך לזהות לכל שאר משתמשי Mullvad Browser, והוא כולל הגדרות ברירת מחדל והרחבות המוגדרות אוטומטית לפי רמות האבטחה המוגדרות כברירת מחדל: *Standard*, *Safer* ו- *Safest*. לכן, הכרחי שלא תשנה את הדפדפן כלל בחוץ תוך התאמת [רמות האבטחה](https://tb-manual.torproject.org/security-settings/) המוגדרות כברירת מחדל. שינויים אחרים יהפכו את טביעת האצבע שלך לייחודית, ויביסו את מטרת השימוש בדפדפן זה. אם אתה רוצה להגדיר את הדפדפן שלך בצורה כבדה יותר וטביעת אצבע אינה מדאיגה אותך, אנו ממליצים במקום זאת על [Firefox](#firefox). -### Anti-Fingerprinting +### נגד טביעת אצבע -**Without** using a [VPN](vpn.md), Mullvad Browser provides the same protections against [naive fingerprinting scripts](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) as other private browsers like Firefox+[Arkenfox](#arkenfox-advanced) or [Brave](#brave). Mullvad Browser provides these protections out of the box, at the expense of some flexibility and convenience that other private browsers can provide. +**ללא** שימוש ב [VPN](vpn.md), דפדפן Mullvad מספק את אותן הגנות נגד [סקריפטים תמימים של טביעת אצבע](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) כמו דפדפנים פרטיים אחרים כמו Firefox+[Arkenfox](#arkenfox-advanced) או [Brave](#brave). Mullvad Browser מספק הגנות אלה מחוץ לקופסה, על חשבון גמישות ונוחות מסוימת שדפדפנים פרטיים אחרים יכולים לספק. -==For the strongest anti-fingerprinting protection, we recommend using Mullvad Browser in conjunction **with** a VPN==, whether that is Mullvad or another recommended VPN provider. When using a VPN with Mullvad Browser, you will share a fingerprint and a pool of IP addresses with many other users, giving you a "crowd" to blend in with. This strategy is the only way to thwart advanced tracking scripts, and is the same anti-fingerprinting technique used by Tor Browser. +==להגנה החזקה ביותר נגד טביעות אצבע, אנו ממליצים להשתמש בדפדפן Mullvad **בשילוב**עם VPN==, בין אם זה Mullvad או ספק VPN מומלץ אחר. בעת שימוש ב-VPN עם דפדפן Mullvad, אתה תשתף טביעת אצבע ומאגר של כתובות IP עם משתמשים רבים אחרים, מה שייתן לך "קהל" להתמזג איתו. אסטרטגיה זו היא הדרך היחידה לסכל תסריטי מעקב מתקדמים, והיא אותה טכניקה נגד טביעת אצבע המשמשת את Tor Browser. -Note that while you can use Mullvad Browser with any VPN provider, other people on that VPN must also be using Mullvad Browser for this "crowd" to exist, something which is more likely on Mullvad VPN compared to other providers, particularly this close to the launch of Mullvad Browser. Mullvad Browser does not have built-in VPN connectivity, nor does it check whether you are using a VPN before browsing; your VPN connection has to be configured and managed separately. +שים לב שבעוד שאתה יכול להשתמש בדפדפן Mullvad עם כל ספק VPN, אנשים אחרים ב-VPN חייבים להשתמש גם הם בדפדפן Mullvad כדי ש"הקהל" הזה יתקיים, משהו שסביר יותר ב-Mullvad VPN בהשוואה לספקים אחרים, במיוחד זה קרוב לזה השקת דפדפן Mullvad. לדפדפן Mullvad אין קישוריות VPN מובנית, והוא גם לא בודק אם אתה משתמש ב-VPN לפני הגלישה; יש להגדיר ולנהל את חיבור ה-VPN שלך בנפרד. -Mullvad Browser comes with the *uBlock Origin* and *NoScript* browser extensions pre-installed. While we typically [don't recommend](#extensions) adding *additional* browser extensions, these extensions that come pre-installed with the browser should **not** be removed or configured outside their default values, because doing so would noticeably make your browser fingerprint distinct from other Mullvad Browser users. It also comes pre-installed with the Mullvad Browser Extension, which *can* be safely removed without impacting your browser fingerprint if you would like, but is also safe to keep even if you don't use Mullvad VPN. +Mullvad Browser מגיע עם *uBlock Origin* ו*NoScript* הרחבות דפדפן מותקנות מראש. בעוד שבדרך כלל [אנו לא ממליצים](#extensions) להוסיף *בנוסף* לתוספים אלו המגיעים מותקנים מראש בדפדפן צריכים**לא** יוסרו או יוגדרו מחוץ לערכי ברירת המחדל שלהם, כי פעולה זו תגרום באופן ניכר להבדיל את טביעת האצבע של הדפדפן שלך ממשתמשים אחרים בדפדפן Mullvad. הוא גם מגיע מותקן מראש עם הרחבת דפדפן Mullvad, *אותה* ניתן להסיר בבטחה מבלי להשפיע על טביעת האצבע של הדפדפן שלך אם תרצה, אך היא גם בטוחה לשמור גם אם אינך משתמש ב-Mullvad VPN. -### Private Browsing Mode +### מצב גלישה פרטית -Mullvad Browser operates in permanent private browsing mode, meaning your history, cookies, and other site data will always be cleared every time the browser is closed. Your bookmarks, browser settings, and extension settings will still be preserved. +דפדפן Mullvad פועל במצב גלישה פרטית קבועה, כלומר ההיסטוריה, העוגיות ונתוני האתר האחרים שלך יימחקו תמיד בכל פעם שהדפדפן ייסגר. הסימניות, הגדרות הדפדפן והגדרות התוסף שלך עדיין יישמרו. -This is required to prevent advanced forms of tracking, but does come at the cost of convenience and some Firefox features, such as Multi-Account Containers. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise don't work properly in Mullvad Browser, and Mullvad Browser for general browsing. +זה נדרש כדי למנוע צורות מתקדמות של מעקב, אבל זה כרוך במחיר של נוחות וכמה תכונות של Firefox, כגון Multi-Account Containers. זכור שאתה תמיד יכול להשתמש במספר דפדפנים, לדוגמה, אתה יכול לשקול להשתמש ב-Firefox+Arkenfox עבור כמה אתרים שאתה רוצה להישאר מחובר אליהם או שלא יפעלו כראוי בדפדפן Mullvad, ובדפדפן Mullvad לגלישה כללית. ### Mullvad Leta -Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-engines.md), but it also comes preinstalled with **Mullvad Leta**, a search engine which requires an active Mullvad VPN subscription to access. Mullvad Leta queries Google's paid search API directly (which is why it is limited to paying subscribers), however because of this limitation it is possible for Mullvad to correlate search queries and Mullvad VPN accounts. For this reason we discourage the use of Mullvad Leta, even though Mullvad collects very little information about their VPN subscribers. +Mullvad Browser מגיע עם DuckDuckGo מוגדר כ[מנוע החיפוש](search-engines.md) המוגדר כברירת מחדל, אך הוא מגיע גם מותקן מראש עם **Mullvad Leta**, מנוע חיפוש שדורש מנוי Mullvad VPN פעיל כדי לגשת אליו. Mullvad Leta מבצע שאילתות ישירות ב-API החיפוש בתשלום של גוגל (ולכן הוא מוגבל למנויים משלמים), אולם בגלל מגבלה זו, ניתן ל-Mullvad לתאם בין שאילתות חיפוש וחשבונות Mullvad VPN. מסיבה זו אנו מונעים את השימוש ב-Mullvad Leta, למרות ש-Mullvad אוספת מעט מאוד מידע על מנויי ה-VPN שלהם. ## Firefox @@ -127,9 +128,9 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- ### תצורה מומלצת -These options can be found in :material-menu: → **Settings** +ניתן למצוא אפשרויות אלה ב :material-menu: ← **הגדרות** -#### Search +#### חיפוש - [ ] בטל את הסימון **הצגת המלצות חיפוש** @@ -137,7 +138,7 @@ These options can be found in :material-menu: → **Settings** הצעות חיפוש שולחות את כל מה שאתה מקליד בסרגל הכתובות למנוע החיפוש המוגדר כברירת מחדל, ללא קשר אם אתה שולח חיפוש בפועל. השבתת הצעות חיפוש מאפשרת לך לשלוט בצורה מדויקת יותר באילו נתונים אתה שולח לספק מנועי החיפוש שלך. -#### Privacy & Security +#### פרטיות& אבטחה ##### הגנה מוגברת מפני מעקב @@ -145,12 +146,12 @@ These options can be found in :material-menu: → **Settings** זה מגן עליך על ידי חסימת מעקבי מדיה חברתית, סקריפטים של טביעת אצבע (שים לב שזה לא מגן עליך מפני *כל* טביעות האצבע), קריפטומינרים, עוגיות מעקב חוצות- אתרים ותוכן מעקב אחר. ETP מגן מפני איומים נפוצים רבים, אך הוא אינו חוסם את כל אפיקי המעקב מכיוון שהוא נועד להשפיע באופן מינימלי עד ללא השפעה על השימושיות באתר. -##### Firefox Suggest (US only) +##### Firefox Suggest (ארה"ב בלבד) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) היא תכונה הדומה להצעות חיפוש שזמינה רק בארה"ב. אנו ממליצים להשבית אותו מאותה סיבה שאנו ממליצים להשבית את הצעות החיפוש. אם אינך רואה את האפשרויות הללו תחת הכותרת **סרגל הכתובות**, אין לך את החוויה החדשה ואתה יכול להתעלם משינויים אלה. -- [ ] Uncheck **Suggestions from the web** -- [ ] Uncheck **Suggestions from sponsors** +- [] בטל את הסימון **הצעות מהאינטרנט** +- [ ] בטל את הסימון **הצעות מנותני חסות** ##### חיטוי בעת סגירה @@ -179,19 +180,19 @@ These options can be found in :material-menu: → **Settings** זה מונע ממך להתחבר ללא כוונה לאתר אינטרנט ב-HTTP בטקסט רגיל. אתרים ללא HTTPS אינם נפוצים כיום, לכן לא אמורה להיות לכך השפעה רבה על הגלישה היומיומית שלך. -#### Sync +#### סנכרון [Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) מאפשר לנתוני הגלישה שלך (היסטוריה, סימניות וכו') להיות נגישים בכל המכשירים שלך ומגן עליהם באמצעות E2EE. ### Arkenfox (מתקדם) -!!! tip "Use Mullvad Browser for advanced anti-fingerprinting" +!!! tip "השתמש בדפדפן Mullvad למניעת טביעת אצבע מתקדמת" - [Mullvad Browser](#mullvad-browser) provides the same anti-fingerprinting protections as Arkenfox out of the box, and does not require the use of Mullvad's VPN to benefit from these protections. Coupled with a VPN, Mullvad Browser can thwart more advanced tracking scripts which Arkenfox cannot. Arkenfox still has the advantage of being much more flexible, and allowing per-site exceptions for websites which you need to stay logged in to. + [דפדפן Mullvad](#mullvad-browser) מספק את אותן הגנות נגד טביעת אצבע כמו Arkenfox מחוץ לקופסה, ואינו מצריך שימוש ב-VPN של Mullvad כדי ליהנות מההגנות הללו. יחד עם VPN, דפדפן Mullvad יכול לסכל סקריפטים מתקדמים יותר למעקב ש-Arkenfox לא יכול. ל-Arkenfox עדיין יש את היתרון להיות הרבה יותר גמיש, ולאפשר חריגים לכל אתר עבור אתרים שאתה צריך להישאר מחובר אליהם. פרויקט [Arkenfox](https://github.com/arkenfox/user.js) מספק קבוצה של אפשרויות שנשקלו בקפידה עבור Firefox. אם אתה [מחליט](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) להשתמש ב-Arkenfox, [כמה אפשרויות](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) הן קפדניות סובייקטיבית ו/או עלולות לגרום לאתרים מסוימים לא לעבוד כראוי [שאותן תוכל לשנות בקלות](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) כדי להתאים לצרכים שלך. אנו **ממליצים בחום** לקרוא את [הויקי](https://github.com/arkenfox/user.js/wiki) המלא שלהם. Arkenfox גם מאפשר תמיכה ב[מכולות](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users). -Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. +Arkenfox שואפת רק לסכל תסריטי מעקב בסיסיים או נאיביים באמצעות קנבס אקראי והגדרות תצורת התנגדות טביעות האצבע המובנות של Firefox. זה לא מכוון לגרום לדפדפן שלך להשתלב עם קהל גדול של משתמשי Arkenfox אחרים באותו אופן שבו Mullvad Browser או Tor Browser עושים, וזו הדרך היחידה לסכל סקריפטים מתקדמים למעקב אחר טביעות אצבע. זכור שאתה תמיד יכול להשתמש במספר דפדפנים, לדוגמה, אתה יכול לשקול להשתמש ב-Firefox+Arkenfox עבור כמה אתרים שאתה רוצה להישאר מחובר אליהם או לסמוך עליהם בדרך אחרת, ואת Mullvad Browser לגלישה כללית. ## Brave @@ -222,7 +223,7 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ניתן למצוא אפשרויות אלה ב - :material-menu: ← **הגדרות**. -#### Settings +#### הגדרות ##### Shields @@ -243,7 +244,7 @@ Brave כולל כמה אמצעים נגד טביעת אצבע בתכונת [Shie -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. אפשרות זו מספקת פונקציונליות דומה ל[מצבי החסימה](https://github.com/gorhill/uBlock/wiki/Blocking-mode) המתקדמים של uBlock Origin או לסיומת [NoScript](https://noscript.net/). ##### חסימת מדיה חברתית @@ -260,11 +261,11 @@ Brave כולל כמה אמצעים נגד טביעת אצבע בתכונת [Shie - [x] בחר **השתמש תמיד בחיבורים מאובטחים** בתוך **אבטחה** תפריט - [ ] בטל **חלון פרטי עם טור** (1) - !!! tip "Sanitizing on Close" + !!! חשוב"חיטוי בסגירה" - - [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu + - [x] בחר**נקה קבצי עוגיות ונתוני אתר בעת סגירת כל החלונות**בתפריט *עוגיות ונתוני אתר אחרים* - If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section. + אם ברצונך להישאר מחובר לאתר מסוים שבו אתה מבקר לעתים קרובות, באפשרותך להגדיר חריגים על בסיס לכל אתר תחת הסעיף *התנהגויות מותאמות אישית*. @@ -279,35 +280,35 @@ Brave כולל כמה אמצעים נגד טביעת אצבע בתכונת [Shie ##### Web3 -Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled. +תכונות ה-Web3 של Brave עשויות להוסיף לטביעת האצבע של הדפדפן ולשטח ההתקפה שלך. אלא אם אתה משתמש באחת מהתכונות, יש להשבית אותן. -- [ ] Set **Default Ethereum Wallet** to **None** -- [ ] Set **Default Solana Wallet** to **None** -- [ ] Set **Method to resolve IPFS resources** to **Disabled +- [ ] הגדר את **ברירת המחדל של ארנק Ethereum** ל**לא** +- [ ] הגדר את **ברירת המחדל של ארנק Solana** ל**לא** +- [ ] הגדר את **שיטה לפתרון משאבי IPFS** ל-**מושבת -##### System +##### מערכת
-- [ ] Uncheck **Continue running apps when Brave is closed** to disable background apps (1) +- [] בטל את הסימון **המשך להפעיל אפליקציות כאשר Brave סגור** כדי להשבית אפליקציות רקע (1)
-1. This option is not present on all platforms. +1. אפשרות זו אינה קיימת בכל הפלטפורמות. -#### Sync +#### סנכרון [Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) מאפשר לנתוני הגלישה שלך (היסטוריה, סימניות וכו ') להיות נגישים בכל המכשירים שלך ללא צורך בחשבון ומגן עליהם באמצעות E2EE. #### Brave Rewards and Wallet -**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature. +**Brave Rewards** מאפשר לך לקבל מטבע קריפטוגרפי Basic Attention Token (BAT) עבור ביצוע פעולות מסוימות בתוך Brave. זה מסתמך על חשבון משמורת ו-KYC ממספר נבחר של ספקים. איננו ממליצים על BAT כ[מטבע קריפטוגרפי פרטי](cryptocurrency.md), וגם איננו ממליצים להשתמש ב[ארנק משמורת](advanced/payments.md#other-coins-bitcoin-ethereum-etc), לכן נמנע משימוש בתכונה זו. -**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. +**Brave Wallet** פועל באופן מקומי במחשב שלך, אך אינו תומך במטבעות קריפטוגרפיים פרטיים כלשהם, ולכן אנו נמנע משימוש גם בתכונה זו. ## מקורות נוספים -In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality. +באופן כללי, אנו ממליצים לשמור על הרחבות הדפדפן שלך למינימום כדי להקטין את משטח ההתקפה שלך; יש להם גישה מוסמכת בדפדפן שלך, הם דורשים ממך לסמוך על המפתח, יכולים לגרום לך [לבלוט](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint) ו[להחליש](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) את בידוד האתרים. עם זאת, uBlock Origin עשוי להיות שימושי אם אתה מעריך פונקציונליות של חסימת תוכן. ### uBlock Origin @@ -328,14 +329,14 @@ In general, we recommend keeping your browser extensions to a minimum to decreas - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) -We suggest following the [developer's documentation](https://github.com/gorhill/uBlock/wiki/Blocking-mode) and picking one of the "modes". Additional filter lists can impact performance and [may increase attack surface](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css). +אנו ממליצים לעקוב אחר התיעוד של [היזם](https://github.com/gorhill/uBlock/wiki/Blocking-mode) ולבחור אחד מה"מצבים ". רשימות מסננים נוספות [עלולות להשפיע על הביצועים ולהגדיל את שטח התקיפה](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css). ##### רשימות אחרות -These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) that you may want to consider adding: +אלה עוד כמה [רשימות מסנן](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) ייתכן שתרצה לשקול הוספה: -- [x] Check **Privacy** > **AdGuard URL Tracking Protection** -- Add [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) +- [x] בדוק **פרטיות** > **הגנה על מעקב אחר כתובות אתרים של AdGuard** +- להוסיף [למעשה כלי URL מקוצר לגיטימי ](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) ## קריטריונים @@ -348,29 +349,29 @@ These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashb ### דרישות מינימליות - חייבת להיות תוכנת קוד פתוח. -- Supports automatic updates. -- Receives engine updates in 0-1 days from upstream release. -- Available on Linux, macOS, and Windows. +- תומך בעדכונים אוטומטיים. +- מקבל עדכוני מנוע בתוך 0 -1 ימים משחרורו במעלה הזרם. +- זמין ב-Linux, macOS ו-Windows. - כל שינוי שיידרש כדי להפוך את הדפדפן ליותר מכבד פרטיות לא צריך להשפיע לרעה על חוויית המשתמש. -- Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^1] +- חוסם קובצי עוגיות של צד שלישי כברירת מחדל. +- תומך [במחיצת מצב](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) כדי להקטין את המעקב בין אתרים.[^1] ### המקרה הטוב ביותר הקריטריונים הטובים ביותר שלנו מייצגים את מה שהיינו רוצים לראות מהפרויקט המושלם בקטגוריה זו. ייתכן שההמלצות שלנו לא יכללו חלק מהפונקציונליות הזו או את כולה, אך אלו שכן כן עשויות לדרג גבוה יותר מאחרות בדף זה. -- Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). -- Supports Progressive Web Apps. - PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. -- Does not include add-on functionality (bloatware) that does not impact user privacy. -- Does not collect telemetry by default. -- Provides open-source sync server implementation. -- Defaults to a [private search engine](search-engines.md). +- כולל פונקציונליות מובנית לחסימת תוכן. +- תומך מידור עוגיות ([מכולות מרובות חשבון](https://support.mozilla.org/en-US/kb/containers)). +- תומך באפליקציות אינטרנט פרוגרסיביות. + PWAs מאפשרים לך להתקין אתרים מסוימים כאילו היו אפליקציות מקוריות במחשב שלך. זה יכול להיות בעל יתרונות על פני התקנת אפליקציות מבוססות-אלקטרון, מכיוון שאתה נהנה מעדכוני האבטחה הרגילים של הדפדפן שלך. +- לא כולל פונקציונליות הרחבה (bloatware) שאינה משפיעה על פרטיות המשתמש. +- אינו אוסף טלמטריה כברירת מחדל. +- מספק יישום שרת סינכרון בקוד פתוח. +- ברירת המחדל היא [מנוע חיפוש פרטי](search-engines.md). ### קריטריונים להרחבה - אסור לשכפל דפדפן מובנה או פונקציונליות מערכת הפעלה. - חייב להשפיע ישירות על פרטיות המשתמש, כלומר לא חייב פשוט לספק מידע. -[^1]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^1]: היישום של Brave מפורט ב [עדכוני פרטיות Brave: חלוקת מצב רשת לפרטיות](https://brave.com/privacy-updates/14-partitioning-network-state/). diff --git a/i18n/he/desktop.md b/i18n/he/desktop.md index 4c2781a5..9feb3da0 100644 --- a/i18n/he/desktop.md +++ b/i18n/he/desktop.md @@ -2,6 +2,7 @@ title: "שולחן עבודה/מחשב אישי" icon: simple/linux description: הפצות לינוקס מומלצות בדרך כלל להגנה על פרטיות וחופש תוכנה. +cover: desktop.png --- הפצות לינוקס מומלצות בדרך כלל להגנה על פרטיות וחופש תוכנה. אם אינך משתמש עדיין בלינוקס, להלן כמה הפצות שאנו מציעים לנסות, כמו גם כמה טיפים כלליים לשיפור פרטיות ואבטחה החלים על הפצות לינוקס רבות. diff --git a/i18n/he/dns.md b/i18n/he/dns.md index f632ee69..79dba9fe 100644 --- a/i18n/he/dns.md +++ b/i18n/he/dns.md @@ -2,6 +2,7 @@ title: "ספקי DNS" icon: material/dns description: אלו הם כמה ספקי DNS מוצפנים שאנו ממליצים לעבור אליהם, כדי להחליף את תצורת ברירת המחדל של ספק שירותי האינטרנט שלך. +cover: dns.png --- יש להשתמש ב-DNS מוצפן עם שרתי צד שלישי רק כדי לעקוף [חסימת DNS](https://en.wikipedia.org/wiki/DNS_blocking) בסיסית כאשר אתה יכול להיות בטוח שלא יהיו השלכות. DNS מוצפן לא יעזור לך להסתיר את פעילות הגלישה שלך. diff --git a/i18n/he/email-clients.md b/i18n/he/email-clients.md index 3b56905b..b684e3f0 100644 --- a/i18n/he/email-clients.md +++ b/i18n/he/email-clients.md @@ -2,6 +2,7 @@ title: "לקוחות אימייל" icon: material/email-open description: לקוחות אימייל אלה מכבדים פרטיות ותומכים בהצפנת אימייל OpenPGP. +cover: email-clients.png --- רשימת ההמלצות שלנו מכילה לקוחות אימייל התומכים הן ב[OpenPGP](encryption.md#openpgp) והן באימות חזק כגון [הרשאת פתוחה ](https://en.wikipedia.org/wiki/OAuth)(OAuth). OAuth מאפשר לך להשתמש ב - [אימות רב - גורמי](basics/multi-factor-authentication.md) ולמנוע גניבת חשבון. diff --git a/i18n/he/email.md b/i18n/he/email.md index 1bdbb563..cee48dc8 100644 --- a/i18n/he/email.md +++ b/i18n/he/email.md @@ -1,8 +1,9 @@ --- -meta_title: "Encrypted Private Email Recommendations - Privacy Guides" +meta_title: "המלצות אימייל פרטי מוצפן - Privacy Guides" title: "שירותי אימייל" icon: material/email description: ספקי אימייל אלה מציעים מקום מצוין לאחסן את המיילים שלך בצורה מאובטחת, ורבים מציעים הצפנת OpenPGP הניתנת להפעלה הדדית עם ספקים אחרים. +cover: email.png --- אימייל הוא למעשה הכרח לשימוש בכל שירות מקוון, אולם איננו ממליצים עליו לשיחות מאדם לאדם. דואר אלקטרוני הוא למעשה הכרח שימוש בכל שירות מקוון, אולם איננו ממליצים עליו לשיחות מאדם לאדם. @@ -124,7 +125,7 @@ Mailbox.org אינו מקבל מטבעות קריפטוגרפיים כלשהם #### :material-check:{ .pg-green } אבטחת חשבון -Mailbox.org תומך ב[אימות דו-שלבי](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) עבור דואר האינטרנט שלהם בלבד. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). תקני אינטרנט כגון [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) אינם נתמכים עדיין. +Mailbox.org תומך ב[אימות דו-שלבי](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) עבור דואר האינטרנט שלהם בלבד. אתה יכול להשתמש ב- TOTP או ב- [YubiKey](https://en.wikipedia.org/wiki/YubiKey) דרך [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). תקני אינטרנט כגון [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) אינם נתמכים עדיין. #### :material-information-outline:{ .pg-blue } אבטחת מידע @@ -410,7 +411,7 @@ SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and **המקרה הטוב ביותר:** -- Encrypts all account data (Contacts, Calendars, etc.) at rest with zero-access encryption. +- מצפין את כל נתוני החשבון (אנשי קשר, יומנים וכו') במצב מנוחה עם הצפנה ללא גישה. - הצפנת דואר אינטרנט משולבת E2EE/PGP מסופקת לנוחיותך. - תמיכה עבור [WKD](https://wiki.gnupg.org/WKD) כדי לאפשר גילוי משופר של מפתחות OpenPGP ציבוריים באמצעות HTTP. משתמשי GnuPG יכולים לקבל מפתח על ידי הקלדה `gpg --locate-key example_user@example.com` - תמיכה בתיבת דואר זמנית למשתמשים חיצוניים. פעולה זו שימושית כאשר ברצונך לשלוח דוא"ל מוצפן, מבלי לשלוח עותק בפועל לנמען שלך. למיילים אלה יש בדרך כלל תוחלת חיים מוגבלת ולאחר מכן נמחקות אוטומטית. הם גם לא דורשים מהנמען להגדיר שום קריפטוגרפיה כמו OpenPGP. @@ -485,14 +486,14 @@ SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and **מינימום כדי לעמוד בדרישות:** -- Must self-host analytics (no Google Analytics, Adobe Analytics, etc.). האתר של הספק חייב גם לציית ל [DNT (לא לעקוב)](https://en.wikipedia.org/wiki/Do_Not_Track) למי שרוצה לבטל את הסכמתו. +- חייב לארח ניתוח עצמי (ללא Google Analytics, Adobe Analytics וכו'). האתר של הספק חייב גם לציית ל [DNT (לא לעקוב)](https://en.wikipedia.org/wiki/Do_Not_Track) למי שרוצה לבטל את הסכמתו. אסור שיהיה שיווק שהוא חסר אחריות: - טענות של "הצפנה בלתי שבירה " יש להשתמש בהצפנה מתוך כוונה שהיא לא תהיה סודית בעתיד כאשר הטכנולוגיה קיימת כדי לפצח אותה. - ביצוע ערבויות של הגנה על 100% אנונימיות. כשמישהו טוען שמשהו הוא 100% זה אומר שאין ודאות לכישלון. אנחנו יודעים שאנשים יכולים בקלות להפוך את עצמם לאיאנונימיים במספר דרכים, למשל.: -- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.) +- שימוש חוזר במידע אישי, למשל. (חשבונות דואר אלקטרוני, שמות בדויים ייחודיים וכו') שאליהם הם ניגשו ללא תוכנת אנונימיות (Tor, VPN וכו') - [טביעת אצבע של דפדפן](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint) **המקרה הטוב ביותר:** diff --git a/i18n/he/encryption.md b/i18n/he/encryption.md index 0948e0a4..b7a27591 100644 --- a/i18n/he/encryption.md +++ b/i18n/he/encryption.md @@ -1,8 +1,9 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" +meta_title: "תוכנות הצפנה מומלצות: VeraCrypt, Cryptomator, PicoCrypt ו-OpenPGP - מדריכי פרטיות" title: "תוכנת הצפנה" icon: material/file-lock description: הצפנה של נתונים היא הדרך היחידה לשלוט מי יכול לגשת אליו. כלים אלה מאפשרים לך להצפין את המיילים שלך וכל קובץ אחר. +cover: encryption.png --- הצפנה של נתונים היא הדרך היחידה לשלוט מי יכול לגשת אליו. אם אינך משתמש כעת בתוכנת הצפנה עבור הדיסק הקשיח, הודעות הדוא"ל או הקבצים שלך, עליך לבחור אפשרות כאן. diff --git a/i18n/he/file-sharing.md b/i18n/he/file-sharing.md index 3e669472..315464e2 100644 --- a/i18n/he/file-sharing.md +++ b/i18n/he/file-sharing.md @@ -2,6 +2,7 @@ title: "שיתוף וסנכרון קבצים" icon: material/share-variant description: גלה כיצד לשתף את הקבצים שלך באופן פרטי בין המכשירים שלך, עם החברים והמשפחה שלך, או באופן אנונימי באינטרנט. +cover: file-sharing.png --- גלה כיצד לשתף את הקבצים שלך באופן פרטי בין המכשירים שלך, עם החברים והמשפחה שלך, או באופן אנונימי באינטרנט. diff --git a/i18n/he/financial-services.md b/i18n/he/financial-services.md index 4f931c16..baea2dc0 100644 --- a/i18n/he/financial-services.md +++ b/i18n/he/financial-services.md @@ -1,6 +1,7 @@ --- title: שירותים פיננסיים icon: material/bank +cover: financial-services.png --- ביצוע תשלומים אונליין הוא אחד האתגרים הגדולים ביותר לפרטיות. שירותים אלה יכולים לסייע לך בהגנה על פרטיותך מפני סוחרים ועוקבים אחרים, בתנאי שיש לך הבנה טובה כיצד לבצע תשלומים פרטיים ביעילות. אנו ממליצים בחום שתקרא תחילה את מאמר סקירת התשלומים שלנו לפני ביצוע רכישות כלשהן: @@ -74,9 +75,9 @@ Privacy.com מספק מידע על הסוחרים מהם אתה רוכש לבנ !!! recommendation - ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } + ![CakePay לוגו](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (זמין בארה"ב ובקנדה) מאפשר לך לרכוש כרטיסי מתנה עבור מגוון גדול של סוחרים. [:octicons-home-16: דף הבית](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="מדיניות פרטיות" } diff --git a/i18n/he/frontends.md b/i18n/he/frontends.md index 9558c3b3..f62b3ffc 100644 --- a/i18n/he/frontends.md +++ b/i18n/he/frontends.md @@ -2,6 +2,7 @@ title: "חזיתות" icon: material/flip-to-front description: ממשקי קוד פתוח אלה לשירותי אינטרנט שונים מאפשרים לך לגשת לתוכן ללא JavaScript או מטרדים אחרים. +cover: frontends.png --- לפעמים שירותים ינסו לאלץ אותך להירשם לחשבון על ידי חסימת גישה לתוכן עם חלונות קופצים מעצבנים. הם יכולים להישבר גם ללא הפעלת JavaScript. חזיתות אלה יכולות לאפשר לך לעקוף את ההגבלות הללו. diff --git a/i18n/he/index.md b/i18n/he/index.md index c8e07bb2..c6ada5ac 100644 --- a/i18n/he/index.md +++ b/i18n/he/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: משאב הפרטיות והאבטחה העצמאיים שלך" template: overrides/home.he.html hide: - navigation @@ -44,7 +44,7 @@ schema: אין לבלבל בין פרטיות לסודיות. אנחנו יודעים מה קורה בשירותים, אבל עדיין סוגרים את הדלת. זה בגלל שאתה רוצה פרטיות, לא סודיות. **לכל** אחד יש על מה להגן. פרטיות היא משהו שהופך אותנו לאנושיים. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-target-account: איומי אינטרנט נפוצים](basics/common-threats.md){ class="md-button md-button--primary" } ## מה אני צריך לעשות? @@ -54,7 +54,7 @@ schema: ==תהליך זה של זיהוי איומים והגדרת אמצעי נגד נקרא **מידול** (מלשון מודל) ** סיכונים ** ==, והוא מהווה את הבסיס לכל תוכנית אבטחה ופרטיות טובה. -[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" } +[:material-book-outline: למידע נוסף על מודל איומים](basics/threat-modeling.md){ class="md-button md-button--primary" } --- diff --git a/i18n/he/mobile-browsers.md b/i18n/he/mobile-browsers.md index aff5cf38..d66aada3 100644 --- a/i18n/he/mobile-browsers.md +++ b/i18n/he/mobile-browsers.md @@ -1,13 +1,14 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" +meta_title: "פרטיות כיבוד דפדפני אינטרנט ניידים עבור אנדרואיד ו - iOS - מדריכי פרטיות" title: "דפדפני אינטרנט לנייד" icon: material/cellphone-information description: דפדפנים אלו הם מה שאנו ממליצים כיום עבור גלישה רגילה/לא אנונימית באינטרנט בטלפון שלך. +cover: mobile-browsers.png schema: - "@context": http://schema.org "@type": WebPage - name: Private Mobile Browser Recommendations + name: המלצות על דפדפן פרטי לנייד url: "./" relatedLink: "../desktop-browsers/" - @@ -84,14 +85,14 @@ Brave כולל כמה אמצעים נגד טביעת אצבע בתכונת [Shie ??? warning "השתמש ברשימות סינון ברירת מחדל" Brave מאפשר לך לבחור מסנני תוכן נוספים בדף הפנימי `brave://adblock`. אנו ממליצים לא להשתמש בתכונה זו; במקום זאת, שמור על רשימות הסינון המוגדרות כברירת מחדל. שימוש ברשימות נוספות יגרום לך להתבלט ממשתמשי Brave אחרים ועלול גם להגדיל את שטח ההתקפה אם יש ניצול ב-Brave וכלל זדוני יתווסף לאחת הרשימות שבהן אתה משתמש. -- [x] Select **Upgrade connections to HTTPS** -- [x] Select **Always use secure connections** -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Strict, may break sites** under **Block fingerprinting** +- [x] בחר **שדרג חיבורים ל- HTTPS** +- [x] בחר**השתמש תמיד בחיבורים מאובטחים** +- [x] (אופציונלי) בחר **חסום סקריפטים** (1) +- [x] בחר **קפדני, עלול לשבור אתרים** תחת **חסום טביעת אצבע** -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. אפשרות זו מספקת פונקציונליות דומה ל [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) המתקדמים של uBlock Origin או ל [NoScript](https://noscript.net/) extension. ##### IPFS @@ -105,17 +106,17 @@ Brave כולל כמה אמצעים נגד טביעת אצבע בתכונת [Shie
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] Uncheck **Allow sites to check if you have payment methods saved** -- [ ] Uncheck **IPFS Gateway** (1) -- [x] Select **Close tabs on exit** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send diagnostic reports** -- [ ] Uncheck **Automatically send daily usage ping to Brave** +- [x] בחר **השבת UDP שאינו פרוקסי** תחת [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [ ] בטל סימון **אפשר לאתרים לבדוק אם יש לך שיטות תשלום שנשמרו** +- [ ] בטל סימון **IPFS Gateway** (1) +- [x] בחר **סגור כרטיסיות ביציאה** +- [ ] בטל סימון **אפשר ניתוח מוצרים ששומר על הפרטיות (P3A)** +- [ ] בטל סימון **שלח דוחות אבחון אוטומטיים** +- [ ] בטל סימון **שליחה אוטומטית של פינג שימוש יומי ל-Brave**
-1. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it. +1. InterPlanetary File System (IPFS) היא רשת מבוזרת, עמית לעמית לאחסון ושיתוף נתונים במערכת קבצים מבוזרת. אלא אם אתה משתמש בתכונה, השבת אותה. #### סנכרון Brave diff --git a/i18n/he/multi-factor-authentication.md b/i18n/he/multi-factor-authentication.md index 0806b0b4..0eaa71fb 100644 --- a/i18n/he/multi-factor-authentication.md +++ b/i18n/he/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "מאמתים מרובי גורמים" icon: 'material/two-factor-authentication' description: כלים אלה מסייעים לך באבטחת חשבונות האינטרנט שלך באמצעות אימות רב-גורמי מבלי לשלוח את הסודות שלך לצד שלישי. +cover: multi-factor-authentication.png --- ## מפתחות אבטחה של חומרה @@ -49,7 +50,7 @@ description: כלים אלה מסייעים לך באבטחת חשבונות ה !!! warning "אזהרה" - בעוד ש-Nitrokeys אינם משחררים את סודות ה-HOTP/TOTP למכשיר שאליו הם מחוברים, אחסון ה-HOTP וה-TOTP **לא** מוצפן ופגיע להתקפות פיזיות. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. + בעוד ש-Nitrokeys אינם משחררים את סודות ה-HOTP/TOTP למכשיר שאליו הם מחוברים, אחסון ה-HOTP וה-TOTP **לא** מוצפן ופגיע להתקפות פיזיות. אם אתם מחפשים לאחסן HOTP או TOTP סודות אלה, אנו ממליצים בחום להשתמש ב- YubiKey במקום זאת. !!! warning "אזהרה" @@ -133,7 +134,7 @@ description: כלים אלה מסייעים לך באבטחת חשבונות ה אנו עובדים על קביעת קריטריונים מוגדרים לכל קטע באתר שלנו, והדבר עשוי להשתנות. אם יש לך שאלות כלשהן לגבי הקריטריונים שלנו, אנא [שאל בפורום שלנו](https://discuss.privacyguides.net/latest) ואל תניח שלא שקלנו משהו כשהצענו את ההמלצות שלנו אם הוא לא רשום כאן. ישנם גורמים רבים שנחשבים ונדונים כאשר אנו ממליצים על פרויקט, ותיעוד כל אחד מהם הוא עבודה בתהליך. -- Source code must be publicly available. +- קוד המקור חייב להיות זמין לציבור. - אסור לדרוש חיבור לאינטרנט. - אסור לסנכרן לשירות סנכרון/גיבוי בענן של צד שלישי. - **אופציונלי** תמיכה בסנכרון E2EE עם כלים מקוריים של מערכת ההפעלה מקובלת, למשל. סנכרון מוצפן באמצעות iCloud. diff --git a/i18n/he/news-aggregators.md b/i18n/he/news-aggregators.md index a7746e47..44cb344b 100644 --- a/i18n/he/news-aggregators.md +++ b/i18n/he/news-aggregators.md @@ -2,6 +2,7 @@ title: "צוברי חדשות" icon: material/rss description: לקוחות צוברי חדשות אלה מאפשרים לך להתעדכן בבלוגים ובאתרי החדשות האהובים עליך באמצעות תקני אינטרנט כמו RSS. +cover: news-aggregators.png --- [צובר חדשות](https://en.wikipedia.org/wiki/News_aggregator) הוא דרך להתעדכן בבלוגים ובאתרי החדשות המועדפים עליך. diff --git a/i18n/he/notebooks.md b/i18n/he/notebooks.md index db7786a8..6b9b10cc 100644 --- a/i18n/he/notebooks.md +++ b/i18n/he/notebooks.md @@ -2,6 +2,7 @@ title: "פנקס רשימות" icon: material/notebook-edit-outline description: אפליקציות רישום רשימות-מוצפנות אלו מאפשרות לך לעקוב אחר הרשימות שלך מבלי לתת אותן לצד שלישי. +cover: notebooks.png --- עקוב אחר ההערות והיומנים שלך מבלי למסור אותם לצד שלישי. @@ -89,7 +90,7 @@ Cryptee מציע 100MB של אחסון בחינם, עם אפשרויות בתש ![Org-mode לוגו](assets/img/notebooks/org-mode.svg){ align=right } - **מצב ארגוני** הוא [מצב ראשי](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) עבור גנו Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. סינכרון אפשרי באמצעות הכלי [file synchronization](file-sharing.md#file-sync). + **מצב ארגוני** הוא [מצב ראשי](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) עבור גנו Emacs. מצב ארגוני מיועד לשמירת הערות, שמירה על רשימות מטלות, תכנון פרויקטים וכתיבת מסמכים עם מערכת טקסט רגיל מהירה ויעילה. סינכרון אפשרי באמצעות הכלי [file synchronization](file-sharing.md#file-sync). [:octicons-home-16: דף הבית](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=תיעוד} diff --git a/i18n/he/os/linux-overview.md b/i18n/he/os/linux-overview.md index be1a64ca..e0c1ab9d 100644 --- a/i18n/he/os/linux-overview.md +++ b/i18n/he/os/linux-overview.md @@ -115,7 +115,7 @@ description: לינוקס היא חלופה למערכת הפעלה שולחני ### כתובת MAC אקראית -Many desktop Linux distributions (Fedora, openSUSE, etc.) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings. +הפצות רבות של לינוקס לשולחן העבודה (Fedora, openSUSE וכו') יגיעו עם [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), כדי להגדיר הגדרות Ethernet ו-Wi-Fi. אפשר [לבצע באקראי](https://fedoramagazine.org/randomize-mac-address-nm/) את [כתובת MAC](https://en.wikipedia.org/wiki/MAC_address) בעת שימוש ב-NetworkManager. זה מספק קצת יותר פרטיות ברשתות Wi-Fi מכיוון שהוא מקשה על מעקב אחר מכשירים ספציפיים ברשת שאליה אתה מחובר. זה [**לא**](https://papers.mathyvanhoef.com/wisec2016.pdf) הופך אותך לאנונימי. diff --git a/i18n/he/passwords.md b/i18n/he/passwords.md index e61485f8..befaf28d 100644 --- a/i18n/he/passwords.md +++ b/i18n/he/passwords.md @@ -1,13 +1,14 @@ --- -meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides" +meta_title: "מנהלי הסיסמאות הטובים ביותר להגנה על הפרטיות והאבטחה שלך - Privacy Guides" title: "מנהלי סיסמאות" icon: material/form-textbox-password description: מנהלי סיסמאות מאפשרים לך לאחסן ולנהל בצורה מאובטחת סיסמאות ואישורים אחרים. +cover: passwords.png schema: - "@context": http://schema.org "@type": WebPage - name: Password Manager Recommendations + name: המלצות למנהל סיסמאות url: "./" - "@context": http://schema.org @@ -18,7 +19,7 @@ schema: sameAs: https://en.wikipedia.org/wiki/Bitwarden applicationCategory: מנהל הסיסמאות operatingSystem: - - Windows + - ווינדוס - macOS - לינוקס - אנדרואיד @@ -36,7 +37,7 @@ schema: sameAs: https://en.wikipedia.org/wiki/1Password applicationCategory: מנהל הסיסמאות operatingSystem: - - Windows + - ווינדוס - macOS - לינוקס - אנדרואיד @@ -68,7 +69,7 @@ schema: sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: מנהל הסיסמאות operatingSystem: - - Windows + - ווינדוס - macOS - לינוקס subjectOf: @@ -107,7 +108,7 @@ schema: url: https://www.gopass.pw/ applicationCategory: מנהל הסיסמאות operatingSystem: - - Windows + - ווינדוס - macOS - לינוקס - FreeBSD diff --git a/i18n/he/productivity.md b/i18n/he/productivity.md index 99953524..1cb688a3 100644 --- a/i18n/he/productivity.md +++ b/i18n/he/productivity.md @@ -2,6 +2,7 @@ title: "כלי פרודוקטיביות" icon: material/file-sign description: רוב חבילות המשרד המקוונות אינן תומכות ב-E2EE, כלומר לספק הענן יש גישה לכל מה שאתה עושה. +cover: productivity.png --- רוב חבילות המשרד המקוונות אינן תומכות ב-E2EE, כלומר לספק הענן יש גישה לכל מה שאתה עושה. מדיניות הפרטיות עשויה להגן על זכויותיך באופן חוקי, אך היא אינה מספקת אילוצי גישה טכניים. diff --git a/i18n/he/real-time-communication.md b/i18n/he/real-time-communication.md index 103f2f50..89cd0a6a 100644 --- a/i18n/he/real-time-communication.md +++ b/i18n/he/real-time-communication.md @@ -1,8 +1,9 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "ההודעות המיידיות הפרטיות הטובות ביותר - Privacy Guides" title: "תקשורת בזמן אמת" icon: material/chat-processing description: מסנג'רים אחרים הופכים את כל השיחות הפרטיות שלך לזמינות לחברה שמנהלת אותן. +cover: real-time-communication.png --- אלו ההמלצות שלנו לתקשורת מוצפנת בזמן אמת. diff --git a/i18n/he/router.md b/i18n/he/router.md index 87c9054a..d3a1ac67 100644 --- a/i18n/he/router.md +++ b/i18n/he/router.md @@ -2,6 +2,7 @@ title: "קושחת הנתב" icon: material/router-wireless description: ניתן להשתמש במערכות הפעלה חלופיות אלה כדי לאבטח את הנתב או נקודת הגישה ל-Wi-Fi. +cover: router.png --- להלן מספר מערכות הפעלה חלופיות, שניתן להשתמש בהן בנתבים, נקודות גישה ל-Wi-Fi וכו'. diff --git a/i18n/he/search-engines.md b/i18n/he/search-engines.md index 66dc61cc..02397b99 100644 --- a/i18n/he/search-engines.md +++ b/i18n/he/search-engines.md @@ -1,8 +1,9 @@ --- -meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" +meta_title: "מנועי חיפוש מומלצים: חלופות גוגל אנונימיות - Privacy Guides" title: "מנועי חיפוש" icon: material/search-web description: מנועי החיפוש המכבדים את הפרטיות אינם בונים פרופיל פרסום על סמך החיפושים שלך. +cover: search-engines.png --- השתמש במנוע חיפוש שאינו בונה פרופיל פרסום על סמך החיפושים שלך. diff --git a/i18n/he/tools.md b/i18n/he/tools.md index 5a886004..b89efd6c 100644 --- a/i18n/he/tools.md +++ b/i18n/he/tools.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" +meta_title: "הכלים, השירותים וההמלצות הטובות ביותר לפרטיות - Privacy Guides" title: "כלי פרטיות" icon: material/tools hide: @@ -31,9 +31,9 @@ description: Privacy Guides הוא האתר השקוף והאמין ביותר
-- ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ .twemoji } [Mullvad Browser](desktop-browsers.md#mullvad-browser) -- ![Firefox logo](assets/img/browsers/firefox.svg){ .twemoji } [Firefox](desktop-browsers.md#firefox) -- ![Brave logo](assets/img/browsers/brave.svg){ .twemoji } [Brave](desktop-browsers.md#brave) +- ![Mullvad Browser לוגו](assets/img/browsers/mullvad_browser.svg){ .twemoji } [Mullvad Browser](desktop-browsers.md#mullvad-browser) +- ![Firefox לוגו](assets/img/browsers/firefox.svg){ .twemoji } [Firefox](desktop-browsers.md#firefox) +- ![Brave לוגו](assets/img/browsers/brave.svg){ .twemoji } [Brave](desktop-browsers.md#brave)
@@ -278,7 +278,7 @@ description: Privacy Guides הוא האתר השקוף והאמין ביותר
-- ![Monero logo](assets/img/cryptocurrency/monero.svg){ .twemoji } [Monero](cryptocurrency.md#monero) +- ![Monero לוגו](assets/img/cryptocurrency/monero.svg){ .twemoji } [Monero](cryptocurrency.md#monero)
diff --git a/i18n/he/tor.md b/i18n/he/tor.md index 111fc6ee..ac61b764 100644 --- a/i18n/he/tor.md +++ b/i18n/he/tor.md @@ -1,24 +1,25 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "דפדפן ורשת Tor: גלישה אנונימית באינטרנט - Privacy Guides" title: "רשת טור (Tor Network)" icon: simple/torproject -description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +description: הגן על הגלישה שלך באינטרנט מעיניים סקרניות על ידי שימוש ברשת Tor, רשת מאובטחת שעוקפת צנזורה. +cover: tor.png schema: - "@context": http://schema.org - "@type": SoftwareApplication + "@type": יישום תוכנה name: דפדפן Tor image: /assets/img/browsers/tor.svg url: https://www.torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) - applicationCategory: Web Browser + applicationCategory: דפדפן אינטרנט operatingSystem: - - Windows + - ווינדוס - macOS - לינוקס - אנדרואיד subjectOf: - "@type": WebPage + "@type": עמוד אינטרנט url: "./" --- @@ -89,9 +90,9 @@ Tor פועלת על ידי ניתוב תעבורת האינטרנט שלך דר - [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) -We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. While this setting can theoretically improve privacy by enforcing the use of a different circuit for each IP address you connect to, it doesn't provide a practical advantage for most applications (especially web browsing), can come with a significant performance penalty, and increases the load on the Tor network. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1] +המלצנו בעבר להפעיל את העדפת *בודד כתובת יעד* בהגדרות Orbot. בעוד שהגדרה זו יכולה לשפר באופן תיאורטי את הפרטיות על ידי אכיפת השימוש במעגל אחר עבור כל כתובת IP שאתה מתחבר אליה, היא אינה מספקת יתרון מעשי לרוב היישומים (במיוחד גלישה באינטרנט), עלולה לבוא עם עונש משמעותי בביצועים ומגבירה העומס על רשת Tor. אנחנו לא ממליצים עוד לשנות הגדרה זו מערך ברירת המחדל שלה, אלא אם כן אתה יודע שצריך.[^1] -!!! טיפ "טיפים עבור אנדרואיד" +!!! tip "טיפים עבור אנדרואיד" Orbot יכול לבצע שרת proxy של אפליקציות בודדות אם הם תומכים ב-SOCKS או HTTP proxy. זה יכול גם לספק את כל חיבורי הרשת שלך באמצעות [VpnService](https://developer.android.com/reference/android/net/VpnService) וניתן להשתמש בו עם מתג ה-VPN ב-:gear: **הגדרות** → * *רשת & אינטרנט** → **VPN** → :gear: → **חסום חיבורים ללא VPN**. @@ -134,4 +135,4 @@ Snowflake אינו מגדיל את פרטיותך בשום צורה, ואינו הפעלת פרוקסי של Snowflake היא בסיכון נמוך, אפילו יותר מהפעלת ממסר Tor או גשר שהם כבר מאמצים לא מסוכנים במיוחד. עם זאת, היא עדיין עושה תעבורת פרוקסי דרך הרשת שלך, מה שיכול להשפיע במובנים מסוימים, במיוחד אם הרשת שלך מוגבלת ברוחב הפס. ודא שאתה מבין [איך Snowflake עובד](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) לפני שתחליט אם להפעיל פרוקסי. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: ההגדרה `IsolateDestAddr` נדונה ב [רשימת התפוצה של תור](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) ו-[Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), שבו שני הפרויקטים מצביעים על כך שזו בדרך כלל לא גישה טובה עבור רוב האנשים. diff --git a/i18n/he/video-streaming.md b/i18n/he/video-streaming.md index ae18817e..f4552ef6 100644 --- a/i18n/he/video-streaming.md +++ b/i18n/he/video-streaming.md @@ -2,6 +2,7 @@ title: "הזרמת וידאו" icon: material/video-wireless description: רשתות אלו מאפשרות לך להזרים תוכן אינטרנט מבלי לבנות פרופיל פרסומי המבוסס על תחומי העניין שלך. +cover: video-streaming.png --- האיום העיקרי בעת שימוש בפלטפורמת הזרמת וידאו הוא שהרגלי הסטרימינג ורשימות המנויים שלך יוכלו לשמש אותך כדי ליצור פרופיל. עליך לשלב את הכלים האלה עם [VPN](vpn.md) או [Tor](https://www.torproject.org/) כדי להקשות על פרופיל השימוש שלך. diff --git a/i18n/he/vpn.md b/i18n/he/vpn.md index b8a0d269..1ddd7b05 100644 --- a/i18n/he/vpn.md +++ b/i18n/he/vpn.md @@ -1,8 +1,9 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" +meta_title: "המלצות והשוואה שירותי VPN פרטיים, ללא נותני חסות או מודעות - Privacy Guides" title: "שירותי VPN" icon: material/vpn description: אלו הם שירותי ה-VPN הטובים ביותר להגנה על הפרטיות והאבטחה שלך באינטרנט. מצא כאן ספק שאינו מעוניין לרגל אחריך. +cover: vpn.png --- אם אתה מחפש **פרטיות** נוספת מ-ISP שלך, ברשת Wi-Fi ציבורית, או תוך כדי טורנט קבצים, VPN עשוי להיות הפתרון עבורך כל עוד אתה מבין את הסיכונים הכרוכים בכך. אנו חושבים שהספקים האלה הם חתך מעל השאר: @@ -311,7 +312,7 @@ VPN הוא חסר טעם אם הוא אפילו לא יכול לספק אבטח אסור שיהיה שיווק שהוא חסר אחריות: - ביצוע ערבויות של הגנה על 100% אנונימיות. כשמישהו טוען שמשהו הוא 100% זה אומר שאין ודאות לכישלון. אנחנו יודעים שאנשים יכולים בקלות להפוך את עצמם לאיאנונימיים במספר דרכים, למשל.: - - Reusing personal information (e.g., email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.) + - שימוש חוזר במידע אישי (למשל, חשבונות אימייל, שמות בדויים ייחודיים וכו') שאליהם הם ניגשו ללא תוכנת אנונימיות (Tor, VPN וכו') - [טביעת אצבע של דפדפן](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint) - טוענים ש - VPN במעגל אחד הוא "אנונימי יותר" מאשר Tor, שהוא מעגל של שלושה כשות או יותר שמשתנה באופן קבוע. - השתמשו בשפה אחראית: כלומר, זה בסדר לומר ש-VPN "מנותק" או "לא מחובר", אולם לטעון שמישהו "חשוף", "פגיע" או "נפרץ" הוא שימוש מיותר בשפה מדאיגה שעשויה להיות שגויה. לדוגמה, ייתכן שהאדם הזה פשוט משתמש בשירות של ספק VPN אחר או משתמש ב - Tor. diff --git a/i18n/hi/android.md b/i18n/hi/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/hi/android.md +++ b/i18n/hi/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/hi/calendar.md b/i18n/hi/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/hi/calendar.md +++ b/i18n/hi/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/hi/cloud.md +++ b/i18n/hi/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/hi/cryptocurrency.md b/i18n/hi/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/hi/cryptocurrency.md +++ b/i18n/hi/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/hi/data-redaction.md b/i18n/hi/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/hi/data-redaction.md +++ b/i18n/hi/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/hi/desktop-browsers.md b/i18n/hi/desktop-browsers.md index ddf97bdb..682e294e 100644 --- a/i18n/hi/desktop-browsers.md +++ b/i18n/hi/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/hi/desktop.md b/i18n/hi/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/hi/desktop.md +++ b/i18n/hi/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/hi/dns.md b/i18n/hi/dns.md index a8cc21da..18ec4ddd 100644 --- a/i18n/hi/dns.md +++ b/i18n/hi/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/hi/email-clients.md b/i18n/hi/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/hi/email-clients.md +++ b/i18n/hi/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/hi/email.md b/i18n/hi/email.md index 43efeb41..1e82b075 100644 --- a/i18n/hi/email.md +++ b/i18n/hi/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/hi/encryption.md b/i18n/hi/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/hi/encryption.md +++ b/i18n/hi/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/hi/file-sharing.md b/i18n/hi/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/hi/file-sharing.md +++ b/i18n/hi/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/hi/financial-services.md b/i18n/hi/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/hi/financial-services.md +++ b/i18n/hi/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/hi/frontends.md b/i18n/hi/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/hi/frontends.md +++ b/i18n/hi/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/hi/mobile-browsers.md b/i18n/hi/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/hi/mobile-browsers.md +++ b/i18n/hi/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/hi/multi-factor-authentication.md b/i18n/hi/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/hi/multi-factor-authentication.md +++ b/i18n/hi/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/hi/news-aggregators.md b/i18n/hi/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/hi/news-aggregators.md +++ b/i18n/hi/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/hi/notebooks.md b/i18n/hi/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/hi/notebooks.md +++ b/i18n/hi/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/hi/passwords.md b/i18n/hi/passwords.md index 485231b1..2ec47075 100644 --- a/i18n/hi/passwords.md +++ b/i18n/hi/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/hi/productivity.md b/i18n/hi/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/hi/productivity.md +++ b/i18n/hi/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/hi/real-time-communication.md b/i18n/hi/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/hi/real-time-communication.md +++ b/i18n/hi/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/hi/router.md b/i18n/hi/router.md index a494c017..834c59f6 100644 --- a/i18n/hi/router.md +++ b/i18n/hi/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/hi/search-engines.md b/i18n/hi/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/hi/search-engines.md +++ b/i18n/hi/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/hi/tor.md b/i18n/hi/tor.md index 8142c1da..d27411a3 100644 --- a/i18n/hi/tor.md +++ b/i18n/hi/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/hi/video-streaming.md b/i18n/hi/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/hi/video-streaming.md +++ b/i18n/hi/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/hi/vpn.md b/i18n/hi/vpn.md index e281b025..28439285 100644 --- a/i18n/hi/vpn.md +++ b/i18n/hi/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/hu/android.md b/i18n/hu/android.md index 595684ff..31bcfab2 100644 --- a/i18n/hu/android.md +++ b/i18n/hu/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/hu/calendar.md b/i18n/hu/calendar.md index 6683d53e..6fc86481 100644 --- a/i18n/hu/calendar.md +++ b/i18n/hu/calendar.md @@ -2,6 +2,7 @@ title: "Naptár Szinkronizálás" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- A naptárak a legérzékenyebb adataidat tartalmazzák; használj at rest End-to-End titkosítást megvalósító termékeket, hogy megakadályozd, hogy a szolgáltató elolvassa ezeket. diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md index a57ef3dd..976f2c5e 100644 --- a/i18n/hu/cloud.md +++ b/i18n/hu/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Felhőtárhely" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Sok felhőalapú tárhelyszolgáltatónak elvárása a teljes bizalmad abban, hogy nem fogják megnézni a fájljaidat. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/hu/cryptocurrency.md b/i18n/hu/cryptocurrency.md index b5b0c685..6e0d13ba 100644 --- a/i18n/hu/cryptocurrency.md +++ b/i18n/hu/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/hu/data-redaction.md b/i18n/hu/data-redaction.md index 363c9943..e6f84418 100644 --- a/i18n/hu/data-redaction.md +++ b/i18n/hu/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Adat és Metaadat Visszatartás" icon: material/tag-remove description: Ezekkel az eszközökkel eltávolíthatod a metaadatokat, például a GPS-helyadatokat és más azonosító információkat a megosztott fényképekről és fájlokról. +cover: data-redaction.png --- Fájlok megosztásakor ügyelj a kapcsolódó metaadatok eltávolítsára. A képfájlok gyakran tartalmaznak [Exif](https://en.wikipedia.org/wiki/Exif) adatokat. A fényképek időnként még GPS-koordinátákat is tartalmaznak a fájl metaadataiban. diff --git a/i18n/hu/desktop-browsers.md b/i18n/hu/desktop-browsers.md index 23b15761..864e744b 100644 --- a/i18n/hu/desktop-browsers.md +++ b/i18n/hu/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/hu/desktop.md b/i18n/hu/desktop.md index 79662918..fb1e4d49 100644 --- a/i18n/hu/desktop.md +++ b/i18n/hu/desktop.md @@ -2,6 +2,7 @@ title: "Asztal/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/hu/dns.md b/i18n/hu/dns.md index 5dce3850..4be6e766 100644 --- a/i18n/hu/dns.md +++ b/i18n/hu/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolverek" icon: material/dns description: Ezekre a titkosított DNS-szolgáltatókra való átállást javasoljuk, hogy lecseréld az internetszolgáltatód alapértelmezett konfigurációját. +cover: dns.png --- Titkosított DNS-t harmadik féltől származó szerverekkel csak alapvető [DNS-blokkolás](https://en.wikipedia.org/wiki/DNS_blocking) megkerülésére kellene használni, ha biztos vagy benne, hogy annak nem lesz semmilyen következménye. A titkosított DNS nem fog segíteni elrejteni a böngészési tevékenységedet. diff --git a/i18n/hu/email-clients.md b/i18n/hu/email-clients.md index 420600a1..4523fd6f 100644 --- a/i18n/hu/email-clients.md +++ b/i18n/hu/email-clients.md @@ -2,6 +2,7 @@ title: "Email kliensek" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/hu/email.md b/i18n/hu/email.md index e6146315..a881cc7a 100644 --- a/i18n/hu/email.md +++ b/i18n/hu/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email szolgáltatások" icon: material/email description: Ezek az e-mail szolgáltatók nagyszerű helyet kínálnak az e-mailek biztonságos tárolására, és sokan kínálnak más szolgáltatókkal együttműködő OpenPGP titkosítást. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/hu/encryption.md b/i18n/hu/encryption.md index 3960968f..72f3db40 100644 --- a/i18n/hu/encryption.md +++ b/i18n/hu/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Titkosító Szoftverek" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/hu/file-sharing.md b/i18n/hu/file-sharing.md index 1bc1eb61..1ce68aae 100644 --- a/i18n/hu/file-sharing.md +++ b/i18n/hu/file-sharing.md @@ -2,6 +2,7 @@ title: "Fájlmegosztás és Szinkronizálás" icon: material/share-variant description: Fedezd fel, hogyan oszthatod meg fájljaid privát módon készülékek között, barátaiddal és családtagjaiddal vagy névtelenül online. +cover: file-sharing.png --- Fedezd fel, hogyan oszthatod meg fájljaid privát módon készülékek között, barátaiddal és családtagjaiddal vagy névtelenül online. diff --git a/i18n/hu/financial-services.md b/i18n/hu/financial-services.md index ef318834..7f5f35e9 100644 --- a/i18n/hu/financial-services.md +++ b/i18n/hu/financial-services.md @@ -1,6 +1,7 @@ --- title: Pénzügyi Szolgáltatások icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/hu/frontends.md b/i18n/hu/frontends.md index b8a27154..240f9180 100644 --- a/i18n/hu/frontends.md +++ b/i18n/hu/frontends.md @@ -2,6 +2,7 @@ title: "Frontendek" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/hu/mobile-browsers.md b/i18n/hu/mobile-browsers.md index 9f0be824..c6ec75f7 100644 --- a/i18n/hu/mobile-browsers.md +++ b/i18n/hu/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/hu/multi-factor-authentication.md b/i18n/hu/multi-factor-authentication.md index b31007fe..c1afd7bd 100644 --- a/i18n/hu/multi-factor-authentication.md +++ b/i18n/hu/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/hu/news-aggregators.md b/i18n/hu/news-aggregators.md index 2fff413c..df8a11fb 100644 --- a/i18n/hu/news-aggregators.md +++ b/i18n/hu/news-aggregators.md @@ -2,6 +2,7 @@ title: "Híraggregátorok" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/hu/notebooks.md b/i18n/hu/notebooks.md index 8c4b8c52..b61ede0b 100644 --- a/i18n/hu/notebooks.md +++ b/i18n/hu/notebooks.md @@ -2,6 +2,7 @@ title: "Jegyzetfüzetek" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Kövesd nyomon jegyzeteid és naplóid anélkül, hogy harmadik félnek adnád át azokat. diff --git a/i18n/hu/passwords.md b/i18n/hu/passwords.md index a048936b..dd7ff422 100644 --- a/i18n/hu/passwords.md +++ b/i18n/hu/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Jelszókezelők" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/hu/productivity.md b/i18n/hu/productivity.md index c517cbb4..87fc5ae3 100644 --- a/i18n/hu/productivity.md +++ b/i18n/hu/productivity.md @@ -2,6 +2,7 @@ title: "Produktivitás Eszközök" icon: material/file-sign description: A legtöbb online irodai programcsomag nem támogatja az End-to-End titkosítást, ami azt jelenti, hogy a felhőszolgáltató hozzáfér mindenhez, amit csinálsz. +cover: productivity.png --- A legtöbb online irodai programcsomag nem támogatja az End-to-End titkosítást, ami azt jelenti, hogy a felhőszolgáltató hozzáfér mindenhez, amit csinálsz. Az adatvédelmi tájékoztató törvényileg védheti a jogaidat, de nem biztosít technikai hozzáférési korlátokat. diff --git a/i18n/hu/real-time-communication.md b/i18n/hu/real-time-communication.md index ab0be8d2..f4c2db81 100644 --- a/i18n/hu/real-time-communication.md +++ b/i18n/hu/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Videó streamelő kliensek" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/hu/router.md b/i18n/hu/router.md index b309f1f7..c2a486ab 100644 --- a/i18n/hu/router.md +++ b/i18n/hu/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Lejjebb bemutatunk néhány alternatív operációs rendszert, amelyek használhatók routereken, Wi-Fi hozzáférési pontokon, stb. diff --git a/i18n/hu/search-engines.md b/i18n/hu/search-engines.md index d9bb7a37..6c00fd8c 100644 --- a/i18n/hu/search-engines.md +++ b/i18n/hu/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Keresőmotorok" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/hu/tor.md b/i18n/hu/tor.md index ba030531..95c2f329 100644 --- a/i18n/hu/tor.md +++ b/i18n/hu/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Hálózat" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/hu/video-streaming.md b/i18n/hu/video-streaming.md index 060092f6..b0e16964 100644 --- a/i18n/hu/video-streaming.md +++ b/i18n/hu/video-streaming.md @@ -2,6 +2,7 @@ title: "Videó Streamelés" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- A videó streamelő platformok használatakor az az elsődleges veszély, hogy a streaming-szokásaid és feliratkozás listáid felhasználhatók profilalkotásra rólad. Ezeket az eszközöket érdemes keverned egy [VPN](vpn.md)-nel vagy [Tor](https://www.torproject.org/)-ra, hogy megnehezítsd a felhasználás szokásaidról készített profilalkotást. diff --git a/i18n/hu/vpn.md b/i18n/hu/vpn.md index 8603e9c1..d22cb5b2 100644 --- a/i18n/hu/vpn.md +++ b/i18n/hu/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Szolgáltatások" icon: material/vpn description: Ezek a legjobb VPN-szolgáltatások az online magánéleted és biztonságod megvédéséhez. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/id/android.md b/i18n/id/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/id/android.md +++ b/i18n/id/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/id/calendar.md b/i18n/id/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/id/calendar.md +++ b/i18n/id/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/id/cloud.md +++ b/i18n/id/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/id/cryptocurrency.md b/i18n/id/cryptocurrency.md index 8345d910..af605001 100644 --- a/i18n/id/cryptocurrency.md +++ b/i18n/id/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Mata Uang Kripto icon: material/bank-circle +cover: cryptocurrency.png --- Melakukan pembayaran secara daring adalah salah satu tantangan terbesar bagi privasi. Mata uang kripto di bawah ini menyediakan privasi transaksi secara bawaan (sesuatu yang **tidak** dijamin oleh sebagian besar mata uang kripto), asalkan Anda memiliki pemahaman yang kuat tentang cara melakukan pembayaran pribadi secara efektif. Kami sangat menyarankan Anda untuk membaca artikel ikhtisar pembayaran kami terlebih dahulu sebelum melakukan pembelian: diff --git a/i18n/id/data-redaction.md b/i18n/id/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/id/data-redaction.md +++ b/i18n/id/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/id/desktop-browsers.md b/i18n/id/desktop-browsers.md index ddf97bdb..682e294e 100644 --- a/i18n/id/desktop-browsers.md +++ b/i18n/id/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/id/desktop.md b/i18n/id/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/id/desktop.md +++ b/i18n/id/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/id/dns.md b/i18n/id/dns.md index 60934bf5..7062649b 100644 --- a/i18n/id/dns.md +++ b/i18n/id/dns.md @@ -2,6 +2,7 @@ title: "Penyelesai DNS" icon: material/dns description: Berikut ini adalah beberapa penyedia DNS terenkripsi yang kami sarankan untuk Anda gunakan, untuk menggantikan konfigurasi bawaan ISP Anda. +cover: dns.png --- DNS terenkripsi dengan server pihak ketiga sebaiknya hanya digunakan untuk mengatasi pemblokiran [DNS dasar](https://en.wikipedia.org/wiki/DNS_blocking) ketika Anda yakin tidak akan ada konsekuensi apa pun. DNS terenkripsi tidak akan membantu Anda menyembunyikan aktivitas penjelajahan Anda. diff --git a/i18n/id/email-clients.md b/i18n/id/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/id/email-clients.md +++ b/i18n/id/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/id/email.md b/i18n/id/email.md index 7e6a81d1..975ffe44 100644 --- a/i18n/id/email.md +++ b/i18n/id/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Layanan Surel" icon: material/email description: Penyedia surel ini menawarkan tempat yang baik untuk menyimpan surel Anda dengan aman, dan banyak yang menawarkan enkripsi OpenPGP yang dapat dioperasikan dengan penyedia lain. +cover: email.png --- Surel bisa dibilang merupakan kebutuhan untuk menggunakan layanan daring apa pun, namun kami tidak merekomendasikannya untuk percakapan antar orang. Daripada menggunakan surel untuk menghubungi orang lain, pertimbangkan untuk menggunakan media pesan instan yang mendukung kerahasiaan penerusan. diff --git a/i18n/id/encryption.md b/i18n/id/encryption.md index b26d9448..7b7a68dd 100644 --- a/i18n/id/encryption.md +++ b/i18n/id/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Perangkat Lunak Enkripsi" icon: material/file-lock description: Enkripsi data adalah satu-satunya cara untuk mengendalikan siapa saja yang dapat mengaksesnya. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Enkripsi data adalah satu-satunya cara untuk mengendalikan siapa saja yang dapat mengaksesnya. Jika saat ini Anda tidak menggunakan perangkat lunak enkripsi untuk perangkat penyimpanan, surel, atau berkas Anda, Anda seharusnya memilih opsi di sini. diff --git a/i18n/id/file-sharing.md b/i18n/id/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/id/file-sharing.md +++ b/i18n/id/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/id/financial-services.md b/i18n/id/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/id/financial-services.md +++ b/i18n/id/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/id/frontends.md b/i18n/id/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/id/frontends.md +++ b/i18n/id/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/id/mobile-browsers.md b/i18n/id/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/id/mobile-browsers.md +++ b/i18n/id/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/id/multi-factor-authentication.md b/i18n/id/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/id/multi-factor-authentication.md +++ b/i18n/id/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/id/news-aggregators.md b/i18n/id/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/id/news-aggregators.md +++ b/i18n/id/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/id/notebooks.md b/i18n/id/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/id/notebooks.md +++ b/i18n/id/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/id/passwords.md b/i18n/id/passwords.md index 937f05f8..95a193dd 100644 --- a/i18n/id/passwords.md +++ b/i18n/id/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/id/productivity.md b/i18n/id/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/id/productivity.md +++ b/i18n/id/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/id/real-time-communication.md b/i18n/id/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/id/real-time-communication.md +++ b/i18n/id/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/id/router.md b/i18n/id/router.md index a494c017..834c59f6 100644 --- a/i18n/id/router.md +++ b/i18n/id/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/id/search-engines.md b/i18n/id/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/id/search-engines.md +++ b/i18n/id/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/id/tor.md b/i18n/id/tor.md index c43dbbe6..a3b1f5d3 100644 --- a/i18n/id/tor.md +++ b/i18n/id/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/id/video-streaming.md b/i18n/id/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/id/video-streaming.md +++ b/i18n/id/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/id/vpn.md b/i18n/id/vpn.md index 7b9479c1..b5778785 100644 --- a/i18n/id/vpn.md +++ b/i18n/id/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "Layanan VPN" icon: material/vpn description: Ini adalah layanan VPN terbaik untuk melindungi privasi dan keamanan daring Anda. Temukan penyedia di sini yang tidak memata-matai Anda. +cover: vpn.png --- Jika Anda mencari **privasi tambahan** dari ISP Anda, pada jaringan Wi-Fi publik, atau saat melakukan torrent file, VPN bisa jadi solusi untuk Anda selama Anda memahami risiko yang ada. Menurut kami, penyedia layanan ini adalah yang terbaik di antara yang lain: diff --git a/i18n/it/about/privacytools.md b/i18n/it/about/privacytools.md index 1f314363..19b0ab5d 100644 --- a/i18n/it/about/privacytools.md +++ b/i18n/it/about/privacytools.md @@ -16,7 +16,7 @@ PrivacyTools è stato creato nel 2015 da "BurungHantu", che voleva creare una ri A partire dal 2019, BurungHantu si è allontanato sempre più dallo sviluppo attivo del sito web e delle community e ha iniziato a ritardare i pagamenti di cui era responsabile per i server che gestivamo. Per evitare che il nostro amministratore di sistema pagasse di tasca propria i costi del server, abbiamo cambiato i metodi di donazione elencati sul sito, passando dai conti personali PayPal e crypto di BurungHantu a una nuova pagina OpenCollective su [31 ottobre 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Questo ha avuto l'ulteriore vantaggio di rendere le nostre finanze completamente trasparenti, un valore in cui crediamo fermamente, e deducibili dalle tasse negli Stati Uniti, in quanto detenute dalla Open Collective Foundation 501(c)3. Questa modifica è stata approvata all'unanimità dal team e non è stata contestata. -## Why We Moved On +## Perchè siamo andati via Nel 2020, l'assenza di BurungHantu è diventata molto più evidente. A un certo punto, abbiamo richiesto che i nameservers del dominio fossero modificati in nameservers controllati dal nostro amministratore di sistema per evitare interruzioni future, e questa modifica non è stata completata per oltre un mese dopo la richiesta iniziale. Scompariva dalla chat pubblica e dalle chat private del team su Matrix per mesi e mesi, facendo di tanto in tanto capolino per dare qualche piccolo feedback o promettere di essere più attivo prima di scomparire di nuovo. @@ -32,11 +32,11 @@ Senza essere in contatto con BurungHantu, abbiamo deciso che la migliore linea d A metà del 2021 il team di PrivacyTools ha contattato Jonah, che ha accettato di rientrare nel team per dare una mano nella transizione. -## Community Call to Action +## Invito all'azione della comunità -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +Alla fine di luglio 2021, noi [abbiamo informato](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) la comunità di PrivacyTools della nostra intenzione di scegliere un nuovo nome e continuare il progetto su un nuovo dominio, che verrà [scelto](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) il 2 agosto 2022. Alla fine è stato scelto "Privacy Guides", con il dominio `privacyguides.org` già di proprietà di Jonah per un progetto collaterale del 2020 che non è stato mai sviluppato. -## Control of r/privacytoolsIO +## Controllo di r/privacytoolsIO Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. @@ -79,9 +79,9 @@ As of September 25th 2022 we are seeing BurungHantu's overall plans come to frui ==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. -## r/privacytoolsIO Now +## r/privacytoolsIO Adesso -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +Dopo il lancio di [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), era improponibile per u/trai_dep continuare a moderare entrambi i subreddit, e con la comunità d'accordo con la transizione, r/privacytoolsIO è stato [reso](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) un sub ristretto in un post del 1 novembre 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -95,9 +95,9 @@ In the months since, BurungHantu has threatened and begged for returning subredd For a community with many thousands of remaining subscribers, we feel that it would be incredibly disrespectful to return control of that massive platform to the person who abandoned it for over a year, and who now operates a website that we feel provides very low-quality information. Preserving the years of past discussions in that community is more important to us, and thus u/trai_dep and the rest of the subreddit moderation team has made the decision to keep r/privacytoolsIO as-is. -## OpenCollective Now +## OpenCollective Adesso -Our fundraising platform, OpenCollective, is another source of contention. Our position is that OpenCollective was put in place by our team and managed by our team to fund services we currently operate and which PrivacyTools no longer does. We [reached out](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) to all of our donors regarding our move to Privacy Guides, and we were unanimously supported by our sponsors and community. +La nostra piattaforma di raccolta fondi, OpenCollective, è un'altra fonte di controversie. Our position is that OpenCollective was put in place by our team and managed by our team to fund services we currently operate and which PrivacyTools no longer does. We [reached out](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) to all of our donors regarding our move to Privacy Guides, and we were unanimously supported by our sponsors and community. Thus, the funds in OpenCollective belong to Privacy Guides, they were given to our project, and not the owner of a well known domain name. In the announcement made to donors on September 17th, 2021, we offered refunds to any donor who disagrees with the stance we took, but nobody has taken us up on this offer: diff --git a/i18n/it/android.md b/i18n/it/android.md index 575217f1..1504d6fe 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -3,6 +3,7 @@ meta_title: "Consigli Android: GrapheneOS e DivestOS - Privacy Guides" title: "Android" icon: 'fontawesome/brands/android' description: Puoi sostituire il sistema operativo del tuo telefono Android con queste alternative sicure e rispettose della privacy. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/it/calendar.md b/i18n/it/calendar.md index 87c9ba3c..5e1a8aa2 100644 --- a/i18n/it/calendar.md +++ b/i18n/it/calendar.md @@ -2,6 +2,7 @@ title: "Sincronizzazione calendario" icon: material/calendar description: I calendari contengono alcuni dei vostri dati più sensibili; utilizzate prodotti che implementino la crittografia a riposo. +cover: calendar.png --- I calendari contengono alcuni dei vostri dati più sensibili; utilizzate prodotti che implementino la E2EE a riposo per impedire al provider di leggerli. diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md index f12488e2..b951a27f 100644 --- a/i18n/it/cloud.md +++ b/i18n/it/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Archiviazione in cloud" icon: material/file-cloud description: Molti fornitori di spazio d'archiviazione in cloud richiedono la tua fiducia sul fatto che non guarderanno i tuoi file. Queste sono alternative private! +cover: cloud.png --- Molti fornitori di spazio di archiviazione cloud richiedono la tua totale fiducia sul fatto che non guarderanno nei tuoi file. Le alternative elencate di seguito eliminano la necessità di fiducia implementando l'E2EE. diff --git a/i18n/it/cryptocurrency.md b/i18n/it/cryptocurrency.md index c401c36c..2322682d 100644 --- a/i18n/it/cryptocurrency.md +++ b/i18n/it/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Criptovalute icon: material/bank-circle +cover: cryptocurrency.png --- Effettuare pagamenti online è una delle maggiori sfide per la privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. Ti consigliamo vivamente di leggere prima il nostro articolo riguardo i pagamenti prima di effettuare qualsiasi acquisto: diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index 8cebd07c..852fd310 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Rimuovere le PII con i metadata scrubber e gli strumenti di riduzio title: "Rimozione di dati e metadati" icon: material/tag-remove description: Utilizza questi strumenti per rimuovere metadati come la posizione GPS e altre informazioni identificative dalle foto e dai file che condividete. +cover: data-redaction.png --- Quando vengono condivisi file, è importante rimuovere i relativi metadata. I file immagine includono comunemente dati [Exif](https://it.wikipedia.org/wiki/Exif). I metadata delle foto, a volte, includono anche le coordinate GPS. diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index cd3b49a0..8e443620 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Browser web che rispettano la privacy per PC e Mac - Privacy Guides title: "Browser desktop" icon: material/laptop description: Questi browser web offrono una maggiore protezione della privacy rispetto a Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/it/desktop.md b/i18n/it/desktop.md index f6965518..ab0502c3 100644 --- a/i18n/it/desktop.md +++ b/i18n/it/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Le distribuzioni Linux sono comunemente consigliate per la protezione della privacy e la libertà del software. +cover: desktop.png --- Le distribuzioni Linux sono comunemente consigliate per la protezione della privacy e la libertà del software. Se non utilizzi già Linux, di seguito ti suggeriamo alcune distribuzioni da provare, oltre ad alcuni consigli generali per migliorare la privacy e la sicurezza applicabili a molte distribuzioni Linux. diff --git a/i18n/it/dns.md b/i18n/it/dns.md index 8a690ae8..ea153362 100644 --- a/i18n/it/dns.md +++ b/i18n/it/dns.md @@ -2,6 +2,7 @@ title: "Resolver DNS" icon: material/dns description: Questi sono alcuni provider DNS cifrati a cui consigliamo di passare, per sostituire la configurazione predefinita del tuo ISP. +cover: dns.png --- I DNS cifrati con server di terze parti dovrebbero essere utilizzati solo per aggirare il [blocco DNS](https://en.wikipedia.org/wiki/DNS_blocking) di base quando si può essere certi che non ci saranno conseguenze. Il DNS cifrato non aiuta a nascondere la tua attività di navigazione. diff --git a/i18n/it/email-clients.md b/i18n/it/email-clients.md index 16b43c7e..83d9d06e 100644 --- a/i18n/it/email-clients.md +++ b/i18n/it/email-clients.md @@ -2,6 +2,7 @@ title: "Client Email" icon: material/email-open description: Questi client email rispettano la privacy e supportano la crittografia OpenPGP. +cover: email-clients.png --- Il nostro elenco di raccomandazioni contiene client di posta elettronica che supportano sia [OpenPGP](encryption.md#openpgp) che l'autenticazione forte come [Open Authorization (OAuth)](https://it.wikipedia.org/wiki/OAuth). OAuth consente di utilizzare l'[autenticazione a più fattori](basics/multi-factor-authentication.md) e di prevenire il furto di account. diff --git a/i18n/it/email.md b/i18n/it/email.md index 927704bc..3ef2903c 100644 --- a/i18n/it/email.md +++ b/i18n/it/email.md @@ -3,6 +3,7 @@ meta_title: "Email Private Criptate consigliate - Privacy Guides" title: "Servizi mail" icon: material/email description: Questi provider di posta elettronica offrono un luogo ideale per archiviare le tue mail in modo sicuro e molti offrono la crittografia OpenPGP interoperabile con altri provider. +cover: email.png --- L'e-mail è praticamente una necessità per l'utilizzo di qualsiasi servizio online, tuttavia non la consigliamo per le conversazioni personali. Piuttosto che utilizzare l'email per contattare altre persone, considera l'utilizzo di un mezzo di messaggistica istantanea che supporta la forward secrecy. diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index c8dcb83c..b39d3f21 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -3,6 +3,7 @@ meta_title: "Software di crittografia consigliati: VeraCrypt, Cryptomator, PicoC title: "Software di crittografia" icon: material/file-lock description: La crittografia dei dati è l'unico modo per controllare chi può accedervi. Questi strumenti ti consentono di crittografare le tue email e qualsiasi altro file. +cover: encryption.png --- La crittografia dei dati è l'unico modo per controllare chi può accedervi. Se al momento non stai utilizzando software per la crittografia del tuo hard disk, delle email, o dei file, dovresti scegliere una delle seguenti opzioni. diff --git a/i18n/it/file-sharing.md b/i18n/it/file-sharing.md index 6b22f83a..e3f8e624 100644 --- a/i18n/it/file-sharing.md +++ b/i18n/it/file-sharing.md @@ -2,6 +2,7 @@ title: "Condivisione e sincronizzazione dei file" icon: material/share-variant description: Scopri come condividere privatamente i tuoi file tra i tuoi dispositivi, con i tuoi amici e familiari, o in modo anonimo online. +cover: file-sharing.png --- Scopri come condividere privatamente i tuoi file tra i tuoi dispositivi, con i tuoi amici e familiari, o in modo anonimo online. diff --git a/i18n/it/financial-services.md b/i18n/it/financial-services.md index 030ad280..d37d8e83 100644 --- a/i18n/it/financial-services.md +++ b/i18n/it/financial-services.md @@ -1,6 +1,7 @@ --- title: Servizi finanziari icon: material/bank +cover: financial-services.png --- Effettuare pagamenti online è una delle maggiori sfide per la privacy. Questi servizi possono aiutarvi a proteggere la vostra privacy dai commercianti e da altri tracker, a condizione che abbiate una buona conoscenza di come effettuare pagamenti privati in modo efficace. Ti consigliamo vivamente di leggere prima il nostro articolo riguardo i pagamenti prima di effettuare qualsiasi acquisto: diff --git a/i18n/it/frontends.md b/i18n/it/frontends.md index fb57aed5..8fbb70e7 100644 --- a/i18n/it/frontends.md +++ b/i18n/it/frontends.md @@ -2,6 +2,7 @@ title: "Frontend" icon: material/flip-to-front description: Questi frontend open-source per vari servizi Internet consentono di accedere ai vari contenuti senza utilizzare JavaScript o altri fastidi. +cover: frontends.png --- A volte i servizi tentano di costringerti ad iscriverti ad un account bloccando l'accesso ai contenuti con fastidiosi popup. Potrebbero anche cessare di funzionare correttamente senza l'abilitazione di JavaScript. Questi frontend possono consentire di aggirare queste restrizioni. diff --git a/i18n/it/kb-archive.md b/i18n/it/kb-archive.md index 3f1efd7e..cf0ef50b 100644 --- a/i18n/it/kb-archive.md +++ b/i18n/it/kb-archive.md @@ -1,12 +1,12 @@ --- title: Archivio conoscenze di base icon: material/archive -description: Some pages that used to be in our knowledge base can now be found on our blog. +description: Alcune pagine che prima si trovavano nella nostra base di conoscenza sono ora disponibili sul nostro blog. --- # Pagine spostate nel blog -Alcune pagine che prima si trovavano nella nostra conoscenza di base sono ora disponibili sul nostro blog: +Alcune pagine che prima si trovavano nella nostra base di conoscenza sono ora disponibili sul nostro blog: - [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) - [Hardening di Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) diff --git a/i18n/it/meta/brand.md b/i18n/it/meta/brand.md index 4641ba84..75122724 100644 --- a/i18n/it/meta/brand.md +++ b/i18n/it/meta/brand.md @@ -1,8 +1,8 @@ --- -title: Branding Guidelines +title: Linee guida per il branding --- -The name of the website is **Privacy Guides** and should **not** be changed to: +Il nome del sito web è **Privacy Guides** e **non** dovrebbe essere cambiato in:
- PrivacyGuides @@ -11,12 +11,12 @@ The name of the website is **Privacy Guides** and should **not** be changed to: - PG.org
-Il nome del subreddit è **r/PrivacyGuides** o ** the Privacy Guides Subreddit **. +Il nome del subreddit è **r/PrivacyGuides** o **il subreddit di Privacy Guides **. -Additional branding guidelines can be found at [github.com/privacyguides/brand](https://github.com/privacyguides/brand) +Ulteriori linee guida sul branding sono disponibili all'indirizzo [github.com/privacyguides/brand](https://github.com/privacyguides/brand) ## Marchio Registrato "Privacy Guides" e il logo dello scudo sono marchi di proprietà di Jonah Aragon, l'uso illimitato è concesso al progetto Privacy Guides. -Without waiving any of its rights, Privacy Guides does not advise others on the scope of its intellectual property rights. Privacy Guides does not permit or consent to any use of its trademarks in any manner that is likely to cause confusion by implying association with or sponsorship by Privacy Guides. Se si è a conoscenza di tali utilizzi, si prega di contattare Jonah Aragon all'indirizzo jonah@privacyguides.org. In caso di domande, consultate il vostro legale. +Senza rinunciare a nessuno dei suoi diritti, Privacy Guides non fornisce consulenza ad altri sulla portata dei propri diritti di proprietà intellettuale. Privacy Guides non permette o acconsente a qualsiasi uso dei suoi marchi in qualsiasi modo che possa causare confusione implicando un'associazione con una sponsorizzazione da parte di Privacy Guides. Se si è a conoscenza di tali utilizzi, si prega di contattare Jonah Aragon all'indirizzo jonah@privacyguides.org. In caso di domande, consultate il vostro legale. diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index 875d3dd1..8226083a 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Browser Web che rispettano la privacy per Android e iOS - Privacy G title: "Browser mobile" icon: octicons/device-mobile-16 description: Questi browser sono quelli che attualmente consigliamo per la navigazione Internet standard/non anonima sul tuo telefono. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md index a5eb0aad..53849e8b 100644 --- a/i18n/it/multi-factor-authentication.md +++ b/i18n/it/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Autenticatori a più fattori" icon: 'material/two-factor-authentication' description: Questi strumenti vi aiutano proteggendo i vostri account Internet con l'Autenticazione a più fattori senza inviare i vostri segreti a terzi. +cover: multi-factor-authentication.png --- ## Chiavi di sicurezza fisiche diff --git a/i18n/it/news-aggregators.md b/i18n/it/news-aggregators.md index 4c6ea143..ce13a3fc 100644 --- a/i18n/it/news-aggregators.md +++ b/i18n/it/news-aggregators.md @@ -2,6 +2,7 @@ title: "Aggregatori di notizie" icon: octicons/rss-24 description: Questi client di aggregazione di notizie consentono di tenersi aggiornati con i blog e siti di news preferiti utilizzando standard Internet come RSS. +cover: news-aggregators.png --- Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un modo per tenersi aggiornati con i blog e siti di news preferiti. diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md index 9af4862c..ae362ce0 100644 --- a/i18n/it/notebooks.md +++ b/i18n/it/notebooks.md @@ -2,6 +2,7 @@ title: "Appunti" icon: material/notebook-edit-outline description: Queste app criptate per prendere appunti consentono di tenere traccia dei propri appunti senza darli a terze parti. +cover: notebooks.png --- Tieni traccia delle tue note e diari senza doverli dare a una terza parte. diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index c605a166..602fd94a 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -3,6 +3,7 @@ meta_title: "I migliori gestori di password per proteggere la tua privacy e sicu title: "Gestori di password" icon: material/form-textbox-password description: I gestori delle password permettono di archiviare e gestire con sicurezza le password e altre credenziali. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/it/productivity.md b/i18n/it/productivity.md index 053941a6..b51d2907 100644 --- a/i18n/it/productivity.md +++ b/i18n/it/productivity.md @@ -2,6 +2,7 @@ title: "Strumenti per la produttività" icon: material/file-sign description: La maggior parte delle suite per ufficio online non supportano la crittografia end-to-end, il che significa che il provider del cloud ha accesso a tutto ciò che fai. +cover: productivity.png --- La maggior parte delle suite per ufficio online non supportano la crittografia end-to-end, il che significa che il provider del cloud ha accesso a tutto ciò che fai. L'informativa sulla privacy potrebbe proteggere legalmente i tuoi diritti, ma non fornisce vincoli tecnici di accesso. diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index ee552270..3a0d65c6 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "Le migliori app di messaggistica istantanea private - Privacy Guide title: "Comunicazione in tempo reale" icon: material/chat-processing description: Altre app di messaggistica istantanea rendono disponibili tutte le tue conversazioni private alla società che le gestisce. +cover: real-time-communication.png --- Questi sono i nostri consigli per comunicazioni crittografate in tempo reale. diff --git a/i18n/it/router.md b/i18n/it/router.md index 29b5ce76..a28af937 100644 --- a/i18n/it/router.md +++ b/i18n/it/router.md @@ -2,6 +2,7 @@ title: "Firmware Router" icon: material/router-wireless description: Questi sistemi operativi alternativi possono essere utilizzati per proteggere il router o l'access point del Wi-Fi. +cover: router.png --- Di seguito sono elencati alcuni sistemi operativi alternativi che possono essere usati su router, access point Wi-Fi, ecc. diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index 71d0fefa..dd6765df 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Motori di ricerca consigliati: Alternative anonime a Google - Priva title: "Motori di ricerca" icon: material/search-web description: Questi motori di ricerca, che rispettano la privacy, non costruiscono un profilo pubblicitario basato sulle vostre ricerche. +cover: search-engines.png --- Utilizza un motore di ricerca che non crei un profilo pubblicitario basato sulle tue ricerche. diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 03c3565c..7d66b08a 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -3,6 +3,7 @@ meta_title: "Browser e rete Tor: Navigazione Web Anonima - Privacy Guides" title: "Rete Tor" icon: simple/torproject description: Proteggi la tua navigazione internet da occhi indiscreti utilizzando la rete Tor, una rete sicura che elude la censura. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/it/video-streaming.md b/i18n/it/video-streaming.md index 929dda84..6a5fbd7e 100644 --- a/i18n/it/video-streaming.md +++ b/i18n/it/video-streaming.md @@ -2,6 +2,7 @@ title: "Streaming video" icon: material/video-wireless description: Queste reti consentono lo streaming di contenuti da Internet senza creare un profilo pubblicitario basato sui propri interessi. +cover: video-streaming.png --- Il rischio principale quando si usa una piattaforma di streaming video è che le tue abitudini e iscrizioni possano essere usate per profilarti. Suggeriamo di utilizzare questi strumenti accompagnati da un [VPN](vpn.md) o [Tor](https://www.torproject.org/) in modo da rendere più difficile la profilazione. diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index 5b571827..495a3296 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -3,6 +3,7 @@ meta_title: "Suggerimenti e confronto tra servizi VPN privati, no sponsor o pubb title: "Servizi VPN" icon: material/vpn description: Questi sono i migliori servizi VPN per proteggere la tua privacy e sicurezza online. Trovate un fornitore che non ti spii. +cover: vpn.png --- Se stai cercando ulteriore **privacy** dal tuo ISP, su una rete Wi-Fi pubblica o durante il torrenting di file, una VPN potrebbe essere la soluzione per te purché tu comprenda i rischi coinvolti. Riteniamo che questi provider siano una spanna sopra gli altri: diff --git a/i18n/ja/about/privacy-policy.md b/i18n/ja/about/privacy-policy.md index 26c668d1..d440687d 100644 --- a/i18n/ja/about/privacy-policy.md +++ b/i18n/ja/about/privacy-policy.md @@ -1,19 +1,19 @@ --- -title: "Privacy Policy" +title: "プライバシーポリシー" --- Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people). -## Data We Collect From Visitors +## 私たちが閲覧者から収集するデータ -The privacy of our website visitors is important to us, so we do not track any individual people. As a visitor to our website: +私たちは、ウェブサイト閲覧者のプライバシーを重視しているため、各個人を追跡することはありません。 As a visitor to our website: -- No personal information is collected -- No information such as cookies are stored in the browser -- No information is shared with, sent to or sold to third-parties -- No information is shared with advertising companies +- 個人情報を収集しません +- Cookieなどの情報をブラウザに保存しません +- 第三者に情報を共有・送信・販売しません +- 広告会社に情報を共有しません - No information is mined and harvested for personal and behavioral trends -- No information is monetized +- 情報を収益化しません You can view the data we collect on our [statistics](statistics.md) page. @@ -40,7 +40,7 @@ On some websites and services you may provide additional information for your ac We will store your account data as long as your account remains open. After closing an account, we may retain some or all of your account data in the form of backups or archives for up to 90 days. -## Contacting Us +## 連絡先 The Privacy Guides team generally does not have access to personal data outside of limited access granted via some moderation panels. Inquiries regarding your personal information should be sent directly to: @@ -54,7 +54,7 @@ For all other inquiries, you can contact any member of our team. For complaints under GDPR more generally, you may lodge complaints with your local data protection supervisory authorities. In France it's the Commission Nationale de l'Informatique et des Libertés which take care and handle the complaints. They provide a [template of complaint letter](https://www.cnil.fr/en/plaintes) to use. -## About This Policy +## このポリシーについて We will post any new versions of this statement [here](privacy-policy.md). We may change how we announce changes in future versions of this document. In the meantime we may update our contact information at any time without announcing a change. Please refer to the [Privacy Policy](privacy-policy.md) for the latest contact information at any time. diff --git a/i18n/ja/android.md b/i18n/ja/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/ja/android.md +++ b/i18n/ja/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/ja/calendar.md b/i18n/ja/calendar.md index a6e1b63d..e7c638bc 100644 --- a/i18n/ja/calendar.md +++ b/i18n/ja/calendar.md @@ -2,6 +2,7 @@ title: "カレンダー同期" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md index c58b5774..47e8b635 100644 --- a/i18n/ja/cloud.md +++ b/i18n/ja/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "クラウドストレージ" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/ja/cryptocurrency.md b/i18n/ja/cryptocurrency.md index 7936d76e..6007a46f 100644 --- a/i18n/ja/cryptocurrency.md +++ b/i18n/ja/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: 暗号通貨 icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ja/data-redaction.md b/i18n/ja/data-redaction.md index 15b3f23a..78733627 100644 --- a/i18n/ja/data-redaction.md +++ b/i18n/ja/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "データとメタデータの編集" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md index 724e5884..ab72547e 100644 --- a/i18n/ja/desktop-browsers.md +++ b/i18n/ja/desktop-browsers.md @@ -1,8 +1,9 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "プライバシーを尊重したPCとMac向けウェブブラウザ - Privacy Guides" title: "デスクトップブラウザ" icon: material/laptop description: これらのウェブブラウザは、Google Chromeよりも強力なプライバシー保護を提供します。 +cover: desktop-browsers.png schema: - "@context": http://schema.org @@ -81,7 +82,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. -### Anti-Fingerprinting +### フィンガープリント対策 **Without** using a [VPN](vpn.md), Mullvad Browser provides the same protections against [naive fingerprinting scripts](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) as other private browsers like Firefox+[Arkenfox](#arkenfox-advanced) or [Brave](#brave). Mullvad Browser provides these protections out of the box, at the expense of some flexibility and convenience that other private browsers can provide. @@ -129,19 +130,19 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- These options can be found in :material-menu: → **Settings** -#### Search +#### 検索 -- [ ] Uncheck **Provide search suggestions** +- [ ] **検索候補を使用する**のチェックを外す Search suggestion features may not be available in your region. Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider. -#### Privacy & Security +#### プライバシーとセキュリティ -##### Enhanced Tracking Protection +##### 強化型トラッキング防止機能 -- [x] Select **Strict** Enhanced Tracking Protection +- [x] 強化型トラッキング防止機能で**厳格**を選択する This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability. @@ -156,14 +157,14 @@ This protects you by blocking social media trackers, fingerprinting scripts (not If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...** -- [x] Check **Delete cookies and site data when Firefox is closed** +- [x] **Firefox を閉じたときに Cookie とサイトデータを削除する**にチェックをつける This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often. ##### Telemetry -- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla** -- [ ] Uncheck **Allow Firefox to install and run studies** +- [ ] **Firefox が技術的な対話データを Mozilla へ送信することを許可する**のチェックを外す +- [ ] **Firefox に調査のインストールと実行を許可する**のチェックを外す - [ ] Uncheck **Allow Firefox to send backlogged crash reports on your behalf** > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. @@ -173,13 +174,13 @@ Additionally, the Firefox Accounts service collects [some technical data](https: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** -##### HTTPS-Only Mode +##### HTTPS-Only モード -- [x] Select **Enable HTTPS-Only Mode in all windows** +- [x] **すべてのウィンドウで HTTPS-Only モードを有効にする**を選択する This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing. -#### Sync +#### 同期 [Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. @@ -296,7 +297,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack 1. This option is not present on all platforms. -#### Sync +#### 同期 [Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. @@ -306,7 +307,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack **Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. -## Additional Resources +## 追加のリソース In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality. @@ -314,9 +315,9 @@ In general, we recommend keeping your browser extensions to a minimum to decreas !!! recommendation - ![uBlock Origin logo](assets/img/browsers/ublock_origin.svg){ align=right } + ![uBlock Originのロゴ](assets/img/browsers/ublock_origin.svg){ align=right } - **uBlock Origin** is a popular content blocker that could help you block ads, trackers, and fingerprinting scripts. + **uBlock Origin**は、広告、トラッカー、フィンガープリントスクリプトのブロックに役立つ人気のコンテンツブロッカーです。 [:octicons-repo-16: Repository](https://github.com/gorhill/uBlock#readme){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/gorhill/uBlock/wiki/Privacy-policy){ .card-link title="Privacy Policy" } @@ -338,7 +339,7 @@ These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashb - [x] Check **Privacy** > **AdGuard URL Tracking Protection** - Add [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) -## Criteria +## 基準 **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/ja/desktop.md b/i18n/ja/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/ja/desktop.md +++ b/i18n/ja/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/ja/dns.md b/i18n/ja/dns.md index a8cc21da..18ec4ddd 100644 --- a/i18n/ja/dns.md +++ b/i18n/ja/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/ja/email-clients.md b/i18n/ja/email-clients.md index 47760ca8..e77338a1 100644 --- a/i18n/ja/email-clients.md +++ b/i18n/ja/email-clients.md @@ -2,6 +2,7 @@ title: "メールクライアント" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/ja/email.md b/i18n/ja/email.md index 43efeb41..1e82b075 100644 --- a/i18n/ja/email.md +++ b/i18n/ja/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md index 17507d9d..40998b81 100644 --- a/i18n/ja/encryption.md +++ b/i18n/ja/encryption.md @@ -1,8 +1,9 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" +meta_title: "おすすめの暗号化ソフトウェア: VeraCrypt、Cryptomator、PicoCrypt、OpenPGP - Privacy Guides" title: "暗号化ソフトウェア" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. @@ -11,7 +12,7 @@ Encryption of data is the only way to control who can access it. If you are curr The options listed here are multi-platform and great for creating encrypted backups of your data. -### Cryptomator (Cloud) +### Cryptomator(クラウド) !!! recommendation @@ -85,7 +86,7 @@ When encrypting with VeraCrypt, you have the option to select from different [ha Truecrypt has been [audited a number of times](https://en.wikipedia.org/wiki/TrueCrypt#Security_audits), and VeraCrypt has also been [audited separately](https://en.wikipedia.org/wiki/VeraCrypt#VeraCrypt_audit). -## OS Full Disk Encryption +## OSのフルディスク暗号化 Modern operating systems include [FDE](https://en.wikipedia.org/wiki/Disk_encryption) and will have a [secure cryptoprocessor](https://en.wikipedia.org/wiki/Secure_cryptoprocessor). @@ -334,7 +335,7 @@ When encrypting with PGP, you have the option to configure different options in - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain) -## Criteria +## 基準 **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/ja/file-sharing.md b/i18n/ja/file-sharing.md index 7dd0d07a..152c1225 100644 --- a/i18n/ja/file-sharing.md +++ b/i18n/ja/file-sharing.md @@ -2,6 +2,7 @@ title: "ファイル共有と同期" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/ja/financial-services.md b/i18n/ja/financial-services.md index 2f5bd353..d951f810 100644 --- a/i18n/ja/financial-services.md +++ b/i18n/ja/financial-services.md @@ -1,6 +1,7 @@ --- title: 金融サービス icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ja/frontends.md b/i18n/ja/frontends.md index 51aec91f..1a148675 100644 --- a/i18n/ja/frontends.md +++ b/i18n/ja/frontends.md @@ -2,6 +2,7 @@ title: "フロントエンド" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ja/index.md b/i18n/ja/index.md index f9808ae4..20c199eb 100644 --- a/i18n/ja/index.md +++ b/i18n/ja/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: プライバシーとセキュリティに関する独立したリソース" template: overrides/home.ja.html hide: - navigation diff --git a/i18n/ja/mobile-browsers.md b/i18n/ja/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/ja/mobile-browsers.md +++ b/i18n/ja/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ja/multi-factor-authentication.md b/i18n/ja/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/ja/multi-factor-authentication.md +++ b/i18n/ja/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/ja/news-aggregators.md b/i18n/ja/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/ja/news-aggregators.md +++ b/i18n/ja/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/ja/notebooks.md b/i18n/ja/notebooks.md index 2d090ca2..7031a518 100644 --- a/i18n/ja/notebooks.md +++ b/i18n/ja/notebooks.md @@ -2,6 +2,7 @@ title: "ノート" icon: material/notebook-edit-outline description: 暗号化ノートアプリで、第三者による閲覧を防止しながらメモを管理できます。 +cover: notebooks.png --- 第三者による閲覧を防止しながら、メモや日記を保存できます。 diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index ccb3a998..0cb74aa5 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "パスワードマネージャ" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/ja/productivity.md b/i18n/ja/productivity.md index 33e53576..3265732e 100644 --- a/i18n/ja/productivity.md +++ b/i18n/ja/productivity.md @@ -2,6 +2,7 @@ title: "生産性向上ツール" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index e54f1241..a9ff7c8e 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "リアルタイムコミュニケーション" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/ja/router.md b/i18n/ja/router.md index a494c017..834c59f6 100644 --- a/i18n/ja/router.md +++ b/i18n/ja/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/ja/search-engines.md b/i18n/ja/search-engines.md index 76630297..d742ba5d 100644 --- a/i18n/ja/search-engines.md +++ b/i18n/ja/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "検索エンジン" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md index f83476b6..a42c0355 100644 --- a/i18n/ja/tor.md +++ b/i18n/ja/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browserとネットワーク: 匿名のウェブブラウジン title: "Torネットワーク" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org @@ -24,7 +25,7 @@ schema: ![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. +**Tor**ネットワークは、ボランティアが運営するサーバ群で、無料で接続でき、インターネット上でのプライバシーとセキュリティの確保に役立ちます。 個人や組織は、プライバシーを損なうことなく、Torネットワーク上で「.onion 秘匿サービス」による情報共有が可能です。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 [:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } diff --git a/i18n/ja/video-streaming.md b/i18n/ja/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/ja/video-streaming.md +++ b/i18n/ja/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/ja/vpn.md b/i18n/ja/vpn.md index 3bf325ca..09b15662 100644 --- a/i18n/ja/vpn.md +++ b/i18n/ja/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPNサービス" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/ko/android.md b/i18n/ko/android.md index d0b9cfd7..aa019968 100644 --- a/i18n/ko/android.md +++ b/i18n/ko/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/ko/calendar.md b/i18n/ko/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/ko/calendar.md +++ b/i18n/ko/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md index b54a4dc1..57d59e39 100644 --- a/i18n/ko/cloud.md +++ b/i18n/ko/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "클라우드 스토리지" icon: material/file-cloud description: 대부분의 클라우드 스토리지 제공 업체는, 업체가 사용자의 파일을 보지 않을 것이라는 믿음이 필수적입니다. 프라이버시 보호 대체제를 소개합니다! +cover: cloud.png --- 대부분의 클라우드 스토리지 서비스에서, 사용자는 그저 '제공 업체가 사용자의 파일을 함부로 열람하지 않을 것'이라고 전적으로 신뢰해야 할 뿐입니다. 아래에 제시된 대안은 E2EE 보안을 구현하여 '신뢰'의 필요성을 처음부터 제거합니다. diff --git a/i18n/ko/cryptocurrency.md b/i18n/ko/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/ko/cryptocurrency.md +++ b/i18n/ko/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ko/data-redaction.md b/i18n/ko/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/ko/data-redaction.md +++ b/i18n/ko/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/ko/desktop-browsers.md b/i18n/ko/desktop-browsers.md index 67f32dce..670fc186 100644 --- a/i18n/ko/desktop-browsers.md +++ b/i18n/ko/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "프라이버시 중점 PC, Mac용 웹 브라우저 - Privacy Guides title: "데스크톱 브라우저" icon: material/laptop description: Google Chrome보다 강력한 프라이버시 보호 기능을 제공하는 브라우저 목록입니다. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ko/desktop.md b/i18n/ko/desktop.md index 2db4d119..1f19293b 100644 --- a/i18n/ko/desktop.md +++ b/i18n/ko/desktop.md @@ -1,7 +1,8 @@ --- -title: "Desktop/PC" +title: "데스크톱/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. @@ -14,51 +15,51 @@ Linux distributions are commonly recommended for privacy protection and software !!! recommendation - ![Fedora logo](assets/img/linux-desktop/fedora-workstation.svg){ align=right } + ![Fedora 로고](assets/img/linux-desktop/fedora-workstation.svg){ align=right } - **Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. + **Fedora Workstation**는 리눅스를 처음 사용하시는 분들에게 추천드리는 배포판입니다. Fedora는 보통 다른 배포판보다 먼저 최신 기술([Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org) 등)을 채택합니다. 최신 기술은 대개 보안, 프라이버시, 사용성을 개선하는 효과를 가져옵니다. - [:octicons-home-16: Homepage](https://getfedora.org/){ .md-button .md-button--primary } - [:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} - [:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } + [:octicons-home-16: 홈페이지](https://getfedora.org/){ .md-button .md-button--primary } + [:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=문서} + [:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=기여 } -Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora는 반-롤링 릴리스 방식입니다. [GNOME](https://www.gnome.org) 등 일부 패키지는 다음 Fedora 릴리스 전까지 고정되지만, 커널을 포함한 대부분의 패키지는 릴리스 수명 기간 동안 자주 업데이트됩니다. 각각의 Fedora 릴리스는 1년간 지원되며, 6개월마다 새 버전이 출시됩니다. ### openSUSE Tumbleweed !!! recommendation - ![openSUSE Tumbleweed logo](assets/img/linux-desktop/opensuse-tumbleweed.svg){ align=right } + ![openSUSE Tumbleweed 로고](assets/img/linux-desktop/opensuse-tumbleweed.svg){ align=right } - **openSUSE Tumbleweed** is a stable rolling release distribution. + **openSUSE Tumbleweed**는 안정적인 롤링 릴리스 배포판입니다. openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. - [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } - [:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} - [:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } + [:octicons-home-16: 홈페이지](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } + [:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=문서} + [:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=기여 } -Tumbleweed follows a rolling release model where each update is released as a snapshot of the distribution. When you upgrade your system, a new snapshot is downloaded. Each snapshot is run through a series of automated tests by [openQA](https://openqa.opensuse.org) to ensure its quality. +Tumbleweed는 각 업데이트가 배포판 스냅샷으로 릴리스되는 롤링 릴리스 방식입니다. 시스템을 업그레이드 할 경우, 새 스냅샷이 다운로드됩니다. 각각의 스냅샷은 [openQA](https://openqa.opensuse.org)에서 일련의 자동화된 테스트를 거쳐 품질이 보장됩니다. ### Arch Linux !!! recommendation - ![Arch logo](assets/img/linux-desktop/archlinux.svg){ align=right } + ![Arch 로고](assets/img/linux-desktop/archlinux.svg){ align=right } - **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). + **Arch Linux**는 여러분이 원하는 것만 설치해서 사용할 수 있는, 간결함과 DIY(Do It Yourself) 특성을 지닌 배포판입니다. 자세한 내용은 Arch Linux [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)를 참고해 주세요. - [:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } - [:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} - [:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } + [:octicons-home-16: 홈페이지](https://archlinux.org/){ .md-button .md-button--primary } + [:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=문서} + [:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=기부 } -Arch Linux has a rolling release cycle. There is no fixed release schedule and packages are updated very frequently. +Arch Linux는 롤링 릴리스 방식입니다. 정해진 릴리스가 존재하지 않으며, 패키지는 매우 자주 업데이트됩니다. -Being a DIY distribution, you are [expected to set up and maintain](os/linux-overview.md#arch-based-distributions) your system on your own. Arch has an [official installer](https://wiki.archlinux.org/title/Archinstall) to make the installation process a little easier. +DIY 배포판이므로 여러분은 자신의 시스템을 여러분 자신이 [직접 구성하고 관리](os/linux-overview.md#arch-based-distributions)해야 합니다. Arch Linux에는 설치 과정을 보다 쉽게 만들어주는 [공식 설치 프로그램](https://wiki.archlinux.org/title/Archinstall)이 존재합니다. A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) are [reproducible](https://reproducible-builds.org). -## Immutable Distributions +## 변경 불가능한 배포판 ### Fedora Silverblue @@ -68,9 +69,9 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Silverblue** and **Fedora Kinoite** are immutable variants of Fedora with a strong focus on container workflows. Silverblue comes with the [GNOME](https://www.gnome.org/) desktop environment while Kinoite comes with [KDE](https://kde.org/). Silverblue and Kinoite follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. - [:octicons-home-16: Homepage](https://silverblue.fedoraproject.org/){ .md-button .md-button--primary } - [:octicons-info-16:](https://docs.fedoraproject.org/en-US/fedora-silverblue/){ .card-link title=Documentation} - [:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } + [:octicons-home-16: 홈페이지](https://silverblue.fedoraproject.org/){ .md-button .md-button--primary } + [:octicons-info-16:](https://docs.fedoraproject.org/en-US/fedora-silverblue/){ .card-link title=문서} + [:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=기여 } Silverblue (and Kinoite) differ from Fedora Workstation as they replace the [DNF](https://fedoraproject.org/wiki/DNF) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/rawhide/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. @@ -84,15 +85,15 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed !!! recommendation - ![NixOS logo](assets/img/linux-desktop/nixos.svg){ align=right } + ![NixOS 로고](assets/img/linux-desktop/nixos.svg){ align=right } - NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. + NixOS는 재현성과 안전성에 중점을 둔 Nix 패키지 관리자를 기반으로 하는 독립 배포판입니다. - [:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } - [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} - [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } + [:octicons-home-16: 홈페이지](https://nixos.org/){ .md-button .md-button--primary } + [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=문서} + [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=기부 } -NixOS’s package manager keeps every version of every package in a different folder in the **Nix store**. Due to this you can have different versions of the same package installed on your system. After the package contents have been written to the folder, the folder is made read-only. +NixOS 패키지 매니저는 모든 패키지의 모든 버전을 **Nix Store**의 폴더에 따로 보관합니다. 따라서, 동일한 하나의 패키지를 시스템에 여러 버전으로 설치할 수 있습니다. 패키지 내용이 폴더에 작성되면 해당 폴더는 읽기 전용으로 설정됩니다. NixOS also provides atomic updates; first it downloads (or builds) the packages and files for the new system generation and then switches to it. There are different ways to switch to a new generation; you can tell NixOS to activate it after reboot or you can switch to it at runtime. You can also *test* the new generation by switching to it at runtime, but not setting it as the current system generation. If something in the update process breaks, you can just reboot and automatically and return to a working version of your system. @@ -102,7 +103,7 @@ Nix the package manager uses a purely functional language - which is also called Nix is a source-based package manager; if there’s no pre-built available in the binary cache, Nix will just build the package from source using its definition. It builds each package in a sandboxed *pure* environment, which is as independent of the host system as possible, thus making binaries reproducible. -## Anonymity-Focused Distributions +## 익명성 중점 배포판 ### Whonix @@ -143,7 +144,7 @@ Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. -## Security-focused Distributions +## 보안성 중점 배포판 ### Qubes OS @@ -153,31 +154,31 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, the X Window System, and Linux, and can run most Linux applications and use most of the Linux drivers. - [:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } - [:material-arrow-right-drop-circle: Overview](os/qubes-overview.md){ .md-button .md-button--primary } + [:octicons-home-16: 홈페이지](https://www.qubes-os.org/){ .md-button .md-button--primary } + [:material-arrow-right-drop-circle: 개요](os/qubes-overview.md){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } - [:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } - [:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } - [:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } + [:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="프라이버시 정책" } + [:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=문서 } + [:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="소스 코드" } + [:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=기부 } Qubes OS is a Xen-based operating system meant to provide strong security for desktop computing through secure virtual machines (VMs), also known as *Qubes*. The Qubes OS operating system secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate VMs. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the system. For further details see the Qubes [FAQ](https://www.qubes-os.org/faq/). -## Criteria +## 평가 기준 -**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. +**Privacy Guides는 권장 목록의 어떠한 프로젝트와도 제휴를 맺지 않았습니다.** 객관적인 권장 목록을 제공하기 위해, [일반적인 평가 기준](about/criteria.md)에 더해 명확한 요구 사항을 정립하였습니다. 어떠한 프로젝트를 선택해 사용하기 전에, 이러한 요구 사항들을 숙지하고 여러분 스스로 조사하는 과정을 거쳐 적절한 선택을 하시기 바랍니다. -!!! example "This section is new" +!!! example "이 단락은 최근에 만들어졌습니다" - We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress. + Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준을 정립하는 중이며, 따라서 세부 내용은 변경될 수 있습니다. 평가 기준에 대해서 질문이 있다면 [포럼에서 문의](https://discuss.privacyguides.net/latest)하시기 바랍니다. (무언가가 목록에 존재하지 않다고 해서 권장 목록을 작성할 때 고려한 적이 없을 것으로 단정 짓지 마세요.) 권장 목록에 어떤 프로젝트를 추가할 때 고려하고 논의해야 할 요소는 매우 많으며, 모든 요소를 문서화하는 것은 현재 진행 중인 작업입니다. -Our recommended operating systems: +Privacy Guides 권장 운영 체제는 다음 조건을 만족해야 합니다: -- Must be open-source. -- Must receive regular software and Linux kernel updates. -- Linux distributions must support [Wayland](os/linux-overview.md#Wayland). -- Must support full-disk encryption during installation. -- Must not freeze regular releases for more than 1 year. We [do not recommend](os/linux-overview.md#release-cycle) "Long Term Support" or "stable" distro releases for desktop usage. -- Must support a wide variety of hardware. +- 오픈 소스여야 합니다. +- 소프트웨어 및 Linux 커널 업데이트를 정기적으로 받아야 합니다. +- Linux 배포판은 [Wayland](os/linux-overview.md#Wayland)를 지원해야 합니다. +- 설치 과정에서 전체 디스크 암호화를 지원해야 합니다. +- 정기 릴리스가 1년 이상 고정되어선 안됩니다. Privacy Guides 데스크톱 사용에 있어서 'LTS(Long Term Support, 장기 지원)'이나 'Stable(안정적인)' 릴리스 배포판을 [권장하지 않습니다](os/linux-overview.md#release-cycle). +- 다양한 하드웨어를 지원해야 합니다. diff --git a/i18n/ko/dns.md b/i18n/ko/dns.md index a8cc21da..18ec4ddd 100644 --- a/i18n/ko/dns.md +++ b/i18n/ko/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/ko/email-clients.md b/i18n/ko/email-clients.md index 408bfb87..78471121 100644 --- a/i18n/ko/email-clients.md +++ b/i18n/ko/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/ko/email.md b/i18n/ko/email.md index 4d304e7d..1d9a42b4 100644 --- a/i18n/ko/email.md +++ b/i18n/ko/email.md @@ -3,6 +3,7 @@ meta_title: "비공개 암호화 이메일 서비스 권장 목록 - Privacy Gui title: "이메일 서비스" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- 이메일은 모든 온라인 서비스 이용에 사실상 필수적이지만, 개인 간 대화에는 권장드리지 않습니다. 다른 사람에게 연락할 때는 이메일보다는 순방향 비밀성을 지원하는 인스턴트 메신저를 사용하는 것이 좋습니다. diff --git a/i18n/ko/encryption.md b/i18n/ko/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/ko/encryption.md +++ b/i18n/ko/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/ko/file-sharing.md b/i18n/ko/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/ko/file-sharing.md +++ b/i18n/ko/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/ko/financial-services.md b/i18n/ko/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/ko/financial-services.md +++ b/i18n/ko/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ko/frontends.md b/i18n/ko/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/ko/frontends.md +++ b/i18n/ko/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ko/mobile-browsers.md b/i18n/ko/mobile-browsers.md index b0f4bf52..681f4833 100644 --- a/i18n/ko/mobile-browsers.md +++ b/i18n/ko/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "프라이버시 중점 모바일(Android, iOS) 웹 브라우저 - P title: "모바일 브라우저" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ko/multi-factor-authentication.md b/i18n/ko/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/ko/multi-factor-authentication.md +++ b/i18n/ko/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/ko/news-aggregators.md b/i18n/ko/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/ko/news-aggregators.md +++ b/i18n/ko/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/ko/notebooks.md b/i18n/ko/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/ko/notebooks.md +++ b/i18n/ko/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index e375cb4e..f11652fc 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "비밀번호 관리자" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/ko/productivity.md b/i18n/ko/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/ko/productivity.md +++ b/i18n/ko/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/ko/real-time-communication.md b/i18n/ko/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/ko/real-time-communication.md +++ b/i18n/ko/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/ko/router.md b/i18n/ko/router.md index a494c017..51f3fa48 100644 --- a/i18n/ko/router.md +++ b/i18n/ko/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. @@ -47,4 +48,4 @@ OPNsense was originally developed as a fork of [pfSense](https://en.wikipedia.or - Must be open source. - Must receive regular updates. -- Must support a wide variety of hardware. +- 다양한 하드웨어를 지원해야 합니다. diff --git a/i18n/ko/search-engines.md b/i18n/ko/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/ko/search-engines.md +++ b/i18n/ko/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/ko/tor.md b/i18n/ko/tor.md index 8142c1da..d27411a3 100644 --- a/i18n/ko/tor.md +++ b/i18n/ko/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/ko/video-streaming.md b/i18n/ko/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/ko/video-streaming.md +++ b/i18n/ko/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/ko/vpn.md b/i18n/ko/vpn.md index e281b025..693ec6dd 100644 --- a/i18n/ko/vpn.md +++ b/i18n/ko/vpn.md @@ -1,8 +1,9 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" -title: "VPN Services" +meta_title: "비공개 VPN 서비스 권장 목록 및 각 서비스 비교 (스폰서/광고 없음) - Privacy Guides" +title: "VPN 서비스" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: @@ -15,7 +16,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne -!!! danger "VPNs do not provide anonymity" +!!! danger "VPN은 익명성을 제공하지 않습니다" Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. @@ -27,9 +28,9 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne [Detailed VPN Overview :material-arrow-right-drop-circle:](basics/vpn-overview.md ""){.md-button} -## Recommended Providers +## 권장 제공 업체 -Our recommended providers use encryption, accept Monero, support WireGuard & OpenVPN, and have a no logging policy. Read our [full list of criteria](#criteria) for more information. +Privacy Guides 권장 제공 업체는 암호화 사용, Monero 결제 지원, WireGuard & OpenVPN 지원, 노 로그 정책을 가지고 있습니다. 자세한 사항은 [전체 평가 기준](#criteria)을 참고해 주세요. ### IVPN @@ -39,12 +40,12 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. - [:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" } + [:octicons-home-16: 홈페이지](https://www.ivpn.net/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="프라이버시 정책" } + [:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=문서} + [:octicons-code-16:](https://github.com/ivpn){ .card-link title="소스 코드" } - ??? downloads + ??? downloads "다운로드" - [:simple-android: Android](https://www.ivpn.net/apps-android/) - [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) @@ -52,12 +53,12 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope - [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) - [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) -#### :material-check:{ .pg-green } 35 Countries +#### :material-check:{ .pg-green } 35개 국가 -IVPN has [servers in 35 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN은 [35개 국가에 서버](https://www.ivpn.net/server-locations)를 보유하고 있습니다.(1) 자신으로부터 가장 가까운 서버를 보유한 VPN 제공 업체를 선택하면 네트워크 트래픽 전송 지연 시간을 줄일 수 있습니다. 목적지까지의 경로가 더 짧기(Hop 횟수가 적기) 때문입니다. { .annotate } -1. Last checked: 2022-09-16 +1. 마지막 확인: 2022-09-16 We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server). @@ -65,47 +66,47 @@ We also think it's better for the security of the VPN provider's private keys if IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). -#### :material-check:{ .pg-green } Open-Source Clients +#### :material-check:{ .pg-green } 오픈 소스 클라이언트 -As of February 2020 [IVPN applications are now open-source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +2020년 2월부터, [모든 IVPN 애플리케이션은 오픈 소스로 공개](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source)되었습니다. 소스 코드는 IVPN [GitHub](https://github.com/ivpn)에서 찾아볼 수 있습니다. -#### :material-check:{ .pg-green } Accepts Cash and Monero +#### :material-check:{ .pg-green } 현금 및 Monero 결제 가능 In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, **Monero** and **cash/local currency** (on annual plans) as anonymous forms of payment. -#### :material-check:{ .pg-green } WireGuard Support +#### :material-check:{ .pg-green } WireGuard 지원 -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN은 WireGuard® 프로토콜을 지원합니다. [WireGuard](https://www.wireguard.com)는 최신식 [암호화](https://www.wireguard.com/protocol/)를 사용하는 최신 프로토콜입니다. 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN은 자신들의 서비스에서 WireGuard 사용을 [권장](https://www.ivpn.net/wireguard/)하며, 모든 IVPN 앱은 WireGuard가 기본값으로 설정되어 있습니다. WireGuard [공식 앱](https://www.wireguard.com/install/)에서 사용할 수 있는 IVPN WireGuard 설정 생성기도 제공하고 있습니다. -#### :material-check:{ .pg-green } Remote Port Forwarding +#### :material-check:{ .pg-green } 원격 포트 포워딩 -Remote [port forwarding](https://en.wikipedia.org/wiki/Port_forwarding) is possible with a Pro plan. Port forwarding [can be activated](https://www.ivpn.net/knowledgebase/81/How-do-I-activate-port-forwarding.html) via the client area. Port forwarding is only available on IVPN when using WireGuard or OpenVPN protocols and is [disabled on US servers](https://www.ivpn.net/knowledgebase/116/Port-forwarding-is-not-working-why.html). +원격 [포트 포워딩](https://ko.wikipedia.org/wiki/%ED%8F%AC%ED%8A%B8_%ED%8F%AC%EC%9B%8C%EB%94%A9)은 Pro 요금제에서 사용 가능합니다. 포트 포워딩은 [Client Area에서 활성화](https://www.ivpn.net/knowledgebase/81/How-do-I-activate-port-forwarding.html)할 수 있습니다. IVPN에서 포트 포워딩은 WireGuard/OpenVPN 프로토콜을 사용할 때만 사용 가능하며, [미국 서버에서는 이용할 수 없습니다](https://www.ivpn.net/knowledgebase/116/Port-forwarding-is-not-working-why.html). -#### :material-check:{ .pg-green } Mobile Clients +#### :material-check:{ .pg-green } 모바일 클라이언트 In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. -#### :material-information-outline:{ .pg-blue } Additional Functionality +#### :material-information-outline:{ .pg-blue } 추가 기능 -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN 클라이언트는 이중 인증을 지원합니다(Mullvad 클라이언트는 지원하지 않습니다). 또한, IVPN은 네트워크 레벨에서 광고 네트워크 및 추적기를 차단하는 [AntiTracker](https://www.ivpn.net/antitracker)기능을 제공합니다. ### Mullvad !!! recommendation - ![Mullvad logo](assets/img/vpn/mullvad.svg){ align=right } + ![Mullvad 로고](assets/img/vpn/mullvad.svg){ align=right } - **Mullvad** is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since **2009**. Mullvad is based in Sweden and does not have a free trial. + **Mullvad** 투명성과 보안에 중점을 둔, 속도가 빠르면서 비싸지 않은 VPN입니다. **2009년**부터 운영되었습니다. Mullvad 본사는 스웨덴에 위치하고 있으며, 무료 체험을 제공하지 않습니다. - [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } - [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" } + [:octicons-home-16: 홈페이지](https://mullvad.net/ko){ .md-button .md-button--primary } + [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion 서비스" } + [:octicons-eye-16:](https://mullvad.net/ko/help/privacy-policy/){ .card-link title="프라이버시 정책" } + [:octicons-info-16:](https://mullvad.net/ko/help/){ .card-link title=문서} + [:octicons-code-16:](https://github.com/mullvad){ .card-link title="소스 코드" } - ??? downloads + ??? downloads "다운로드" - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) - [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) @@ -114,12 +115,12 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN - [:simple-apple: macOS](https://mullvad.net/en/download/macos/) - [:simple-linux: Linux](https://mullvad.net/en/download/linux/) -#### :material-check:{ .pg-green } 41 Countries +#### :material-check:{ .pg-green } 41개 국가 -Mullvad has [servers in 41 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad는 [41개 국가에 서버](https://mullvad.net/servers/)를 보유하고 있습니다.(1) 자신으로부터 가장 가까운 서버를 보유한 VPN 제공 업체를 선택하면 네트워크 트래픽 전송 지연 시간을 줄일 수 있습니다. 목적지까지의 경로가 더 짧기(Hop 횟수가 적기) 때문입니다. { .annotate } -1. Last checked: 2023-01-19 +1. 마지막 확인: 2023-01-19 We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server). @@ -135,17 +136,17 @@ In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/result In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). -#### :material-check:{ .pg-green } Open-Source Clients +#### :material-check:{ .pg-green } 오픈 소스 클라이언트 Mullvad provides the source code for their desktop and mobile clients in their [GitHub organization](https://github.com/mullvad/mullvadvpn-app). -#### :material-check:{ .pg-green } Accepts Cash and Monero +#### :material-check:{ .pg-green } 현금 및 Monero 결제 가능 Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, **Monero** and **cash/local currency** as anonymous forms of payment. They also accept Swish and bank wire transfers. -#### :material-check:{ .pg-green } WireGuard Support +#### :material-check:{ .pg-green } WireGuard 지원 -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com)는 최신식 [암호화](https://www.wireguard.com/protocol/)를 사용하는 최신 프로토콜입니다. 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). @@ -153,15 +154,15 @@ Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of Wire Mullvad supports the future of networking [IPv6](https://en.wikipedia.org/wiki/IPv6). Their network allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/) as opposed to other providers who block IPv6 connections. -#### :material-check:{ .pg-green } Remote Port Forwarding +#### :material-check:{ .pg-green } 원격 포트 포워딩 Remote [port forwarding](https://en.wikipedia.org/wiki/Port_forwarding) is allowed for people who make one-time payments, but not allowed for accounts with a recurring/subscription-based payment method. This is to prevent Mullvad from being able to identify you based on your port usage and stored subscription information. See [Port forwarding with Mullvad VPN](https://mullvad.net/help/port-forwarding-and-mullvad/) for more information. -#### :material-check:{ .pg-green } Mobile Clients +#### :material-check:{ .pg-green } 모바일 클라이언트 Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). -#### :material-information-outline:{ .pg-blue } Additional Functionality +#### :material-information-outline:{ .pg-blue } 추가 기능 Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). @@ -169,16 +170,16 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad !!! recommendation annotate - ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ align=right } + ![Proton VPN 로고](assets/img/vpn/protonvpn.svg){ align=right } - **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. + **Proton VPN**은 VPN 분야의 강력한 경쟁자로, 2016년부터 운영되고 있습니다. Proton AG 본사는 스위스에 위치하고 있으며, 제한된 무료 플랜과 더 많은 기능을 갖춘 프리미엄 옵션을 제공합니다. - [:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" } + [:octicons-home-16: 홈페이지](https://protonvpn.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="프라이버시 정책" } + [:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=문서} + [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="소스 코드" } - ??? downloads + ??? downloads "다운로드" - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) - [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) @@ -186,12 +187,12 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad - [:simple-windows11: Windows](https://protonvpn.com/download-windows) - [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) -#### :material-check:{ .pg-green } 67 Countries +#### :material-check:{ .pg-green } 67개 국가 -Proton VPN has [servers in 67 countries](https://protonvpn.com/vpn-servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Proton VPN은 [67개 국가에 서버](https://protonvpn.com/vpn-servers)를 보유하고 있습니다.(1) 자신으로부터 가장 가까운 서버를 보유한 VPN 제공 업체를 선택하면 네트워크 트래픽 전송 지연 시간을 줄일 수 있습니다. 목적지까지의 경로가 더 짧기(Hop 횟수가 적기) 때문입니다. { .annotate } -1. Last checked: 2022-09-16 +1. 마지막 확인: 2022-09-16 We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server). @@ -199,7 +200,7 @@ We also think it's better for the security of the VPN provider's private keys if As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). -#### :material-check:{ .pg-green } Open-Source Clients +#### :material-check:{ .pg-green } 오픈 소스 클라이언트 Proton VPN provides the source code for their desktop and mobile clients in their [GitHub organization](https://github.com/ProtonVPN). @@ -207,9 +208,9 @@ Proton VPN provides the source code for their desktop and mobile clients in thei Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](advanced/payments.md#other-coins-bitcoin-ethereum-etc), also accepts **cash/local currency** as an anonymous form of payment. -#### :material-check:{ .pg-green } WireGuard Support +#### :material-check:{ .pg-green } WireGuard 지원 -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com)는 최신식 [암호화](https://www.wireguard.com/protocol/)를 사용하는 최신 프로토콜입니다. 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. @@ -217,11 +218,11 @@ Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGu Proton VPN currently only supports remote [port forwarding](https://protonvpn.com/support/port-forwarding/) on Windows, which may impact some applications. Especially Peer-to-peer applications like Torrent clients. -#### :material-check:{ .pg-green } Mobile Clients +#### :material-check:{ .pg-green } 모바일 클라이언트 In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. -#### :material-information-outline:{ .pg-blue } Additional Functionality +#### :material-information-outline:{ .pg-blue } 추가 기능 Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer adblocking and known malware domains blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. diff --git a/i18n/ku-IQ/android.md b/i18n/ku-IQ/android.md index f38572fd..94cb2690 100644 --- a/i18n/ku-IQ/android.md +++ b/i18n/ku-IQ/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "ئەندرۆید" icon: 'simple/android' description: 'دەتوانیت سیستەمی کارپێکردن سەر تەلەفۆنی ئەندرۆیدەکەت بگۆڕیت بۆ ئەم جێگرەوانەی، کە پارێزراو و ڕێزگرن لە تایبەتمەندێتی.' +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/calendar.md b/i18n/ku-IQ/calendar.md index bbcb033a..c97d39bd 100644 --- a/i18n/ku-IQ/calendar.md +++ b/i18n/ku-IQ/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md index ec8f0a82..85cb6ca0 100644 --- a/i18n/ku-IQ/cloud.md +++ b/i18n/ku-IQ/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/ku-IQ/cryptocurrency.md b/i18n/ku-IQ/cryptocurrency.md index a994b44f..551fe3b0 100644 --- a/i18n/ku-IQ/cryptocurrency.md +++ b/i18n/ku-IQ/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ku-IQ/data-redaction.md b/i18n/ku-IQ/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/ku-IQ/data-redaction.md +++ b/i18n/ku-IQ/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/ku-IQ/desktop-browsers.md b/i18n/ku-IQ/desktop-browsers.md index ddf97bdb..682e294e 100644 --- a/i18n/ku-IQ/desktop-browsers.md +++ b/i18n/ku-IQ/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/desktop.md b/i18n/ku-IQ/desktop.md index 2db4d119..a9059fda 100644 --- a/i18n/ku-IQ/desktop.md +++ b/i18n/ku-IQ/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/ku-IQ/dns.md b/i18n/ku-IQ/dns.md index becfd4b9..a0c853d5 100644 --- a/i18n/ku-IQ/dns.md +++ b/i18n/ku-IQ/dns.md @@ -2,6 +2,7 @@ title: "چارەسەرکەرانی DNS" icon: material/dns description: ئەمانە هەندێک لە دابینکەرانی DNSـی شفرکراون، کە پێشنیاری بەکارهێنانیان دەکەین. بۆ ڕزگارت بوون لە شێوەپێدراوە بنەڕەتیکانی ISPـیەکەت. +cover: dns.png --- DNSـی شفرکراو تەنها دەبێت بەکار بهێنرێت لەگەڵ ڕاژەکاری لایەنی سێیەم بۆ تێپەڕاندنی [قەدەغەکردنێکی DNSـی](https://en.wikipedia.org/wiki/DNS_blocking) سادە. کاتێک دڵنیا دەبیت کە هیچ دەرئەنجامێک نابێت. DNSـی شفرکراو یارمەتیت نادات لە شاردنەوەی هیچ یەکێک لە چالاکیەکانی گەڕانت. diff --git a/i18n/ku-IQ/email-clients.md b/i18n/ku-IQ/email-clients.md index eec0e292..94548b9f 100644 --- a/i18n/ku-IQ/email-clients.md +++ b/i18n/ku-IQ/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/ku-IQ/email.md b/i18n/ku-IQ/email.md index 8e674c7f..fa7f2782 100644 --- a/i18n/ku-IQ/email.md +++ b/i18n/ku-IQ/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "خزمەتگوزاری پۆستەی ئەلکتڕۆنی" icon: material/email description: ئەم دابینکەرانەی پۆستەی ئەلکتڕۆنی شوێنێکی نایاب پێشکەش دەکەن بۆ کۆکردنەوەی پۆستەکان بە پارێزراوی. +cover: email.png --- پۆستەی ئەلکتڕۆنی بەتایبەتی گرنگە بۆ بەکارهێنانی هەر خزمەتگوزاریەکی سەرهێڵ، بەڵام ئێمە پێشنیاری ناکەین بۆ گفتوفۆی دوو کەسی. لەجیاتی بەکارهێنانی پۆستەی ئەلکتڕۆنی بۆ پەیوەندی کردن بە کەسانی تر، ڕەچاوی بەکارهێنانی ئامرازێکی نامەبەری دەستبەجێ بکە، کە پشتگیری لە نهێنیکردنی بەردەوام دەکات. diff --git a/i18n/ku-IQ/encryption.md b/i18n/ku-IQ/encryption.md index 4391eba5..0b85dade 100644 --- a/i18n/ku-IQ/encryption.md +++ b/i18n/ku-IQ/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/ku-IQ/file-sharing.md b/i18n/ku-IQ/file-sharing.md index 3e79d791..6548c1bb 100644 --- a/i18n/ku-IQ/file-sharing.md +++ b/i18n/ku-IQ/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/ku-IQ/financial-services.md b/i18n/ku-IQ/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/ku-IQ/financial-services.md +++ b/i18n/ku-IQ/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ku-IQ/frontends.md b/i18n/ku-IQ/frontends.md index d717b093..98e4e78f 100644 --- a/i18n/ku-IQ/frontends.md +++ b/i18n/ku-IQ/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ku-IQ/mobile-browsers.md b/i18n/ku-IQ/mobile-browsers.md index acc0c9c2..049e9836 100644 --- a/i18n/ku-IQ/mobile-browsers.md +++ b/i18n/ku-IQ/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/multi-factor-authentication.md b/i18n/ku-IQ/multi-factor-authentication.md index a4030c74..94ddd9a0 100644 --- a/i18n/ku-IQ/multi-factor-authentication.md +++ b/i18n/ku-IQ/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/ku-IQ/news-aggregators.md b/i18n/ku-IQ/news-aggregators.md index 2dad5ac0..58832bd6 100644 --- a/i18n/ku-IQ/news-aggregators.md +++ b/i18n/ku-IQ/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/ku-IQ/notebooks.md b/i18n/ku-IQ/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/ku-IQ/notebooks.md +++ b/i18n/ku-IQ/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/ku-IQ/passwords.md b/i18n/ku-IQ/passwords.md index 485231b1..2ec47075 100644 --- a/i18n/ku-IQ/passwords.md +++ b/i18n/ku-IQ/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/productivity.md b/i18n/ku-IQ/productivity.md index 4490325d..a5a6f4a6 100644 --- a/i18n/ku-IQ/productivity.md +++ b/i18n/ku-IQ/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/ku-IQ/real-time-communication.md b/i18n/ku-IQ/real-time-communication.md index 7abd8617..9fc46b69 100644 --- a/i18n/ku-IQ/real-time-communication.md +++ b/i18n/ku-IQ/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/ku-IQ/router.md b/i18n/ku-IQ/router.md index a494c017..834c59f6 100644 --- a/i18n/ku-IQ/router.md +++ b/i18n/ku-IQ/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/ku-IQ/search-engines.md b/i18n/ku-IQ/search-engines.md index a590a9eb..612a5eaf 100644 --- a/i18n/ku-IQ/search-engines.md +++ b/i18n/ku-IQ/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/ku-IQ/tor.md b/i18n/ku-IQ/tor.md index 8142c1da..d27411a3 100644 --- a/i18n/ku-IQ/tor.md +++ b/i18n/ku-IQ/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/video-streaming.md b/i18n/ku-IQ/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/ku-IQ/video-streaming.md +++ b/i18n/ku-IQ/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/ku-IQ/vpn.md b/i18n/ku-IQ/vpn.md index 88052f9e..61dab825 100644 --- a/i18n/ku-IQ/vpn.md +++ b/i18n/ku-IQ/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/nl/android.md b/i18n/nl/android.md index 3c9325f6..c860e991 100644 --- a/i18n/nl/android.md +++ b/i18n/nl/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Je kunt het besturingssysteem op jouw Android-telefoon vervangen door deze veilige en privacy respecterende alternatieven. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/nl/calendar.md b/i18n/nl/calendar.md index 295b2d48..0dcde41b 100644 --- a/i18n/nl/calendar.md +++ b/i18n/nl/calendar.md @@ -2,6 +2,7 @@ title: "Kalendersynchronisatie" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Kalenders en contactpersonen bevatten enkele van jouw gevoeligste gegevens; gebruik producten die E2EE in rust implementeren om te voorkomen dat een provider ze kan lezen. diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index c8f4dd8f..6eeba6b5 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud opslag" icon: material/file-cloud description: Veel aanbieders van cloud-opslag eisen jouw volledige vertrouwen dat zij niet in jouw bestanden zullen kijken. Dit zijn de privé alternatieven! +cover: cloud.png --- Veel aanbieders van cloud-opslag eisen jouw volledige vertrouwen dat zij niet in jouw bestanden zullen kijken. De onderstaande alternatieven elimineren de noodzaak van vertrouwen door veilige E2EE te implementeren. diff --git a/i18n/nl/cryptocurrency.md b/i18n/nl/cryptocurrency.md index a50f84a3..6787f606 100644 --- a/i18n/nl/cryptocurrency.md +++ b/i18n/nl/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Online betalen is een van de grootste uitdagingen voor privacy. Deze cryptocurrencies bieden standaard transactieprivacy (iets wat door de meeste cryptocurrencies **niet** wordt gegarandeerd), mits je goed begrijpt hoe je private betalingen effectief kunt uitvoeren. Wij raden je sterk aan eerst ons overzichtsartikel over betalingen te lezen voordat je aankopen doet: diff --git a/i18n/nl/data-redaction.md b/i18n/nl/data-redaction.md index bbad5fb0..6fda4415 100644 --- a/i18n/nl/data-redaction.md +++ b/i18n/nl/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Redactie van gegevens en metagegevens" icon: material/tag-remove description: Gebruik deze hulpmiddelen om metadata zoals GPS-locatie en andere identificerende informatie te verwijderen uit foto's en bestanden die je deelt. +cover: data-redaction.png --- Wanneer je bestanden deelt, is het belangrijk om de bijbehorende metadata te verwijderen. Afbeeldingsbestanden bevatten vaak [Exif](https://en.wikipedia.org/wiki/Exif) data. Foto's bevatten soms zelfs GPS-coördinaten in de metadata van het bestand. diff --git a/i18n/nl/desktop-browsers.md b/i18n/nl/desktop-browsers.md index 337ecd71..1fb57b0c 100644 --- a/i18n/nl/desktop-browsers.md +++ b/i18n/nl/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: Deze webbrowsers bieden sterkere privacybescherming dan Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/nl/desktop.md b/i18n/nl/desktop.md index b9eb4d88..e4a2ba63 100644 --- a/i18n/nl/desktop.md +++ b/i18n/nl/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux-distributies worden algemeen aanbevolen voor privacybescherming en softwarevrijheid. +cover: desktop.png --- Linux-distributies worden algemeen aanbevolen voor privacybescherming en softwarevrijheid. Als je nog geen Linux gebruikt, zijn hieronder enkele distributies die we aanraden om uit te proberen, evenals enkele algemene tips om je privacy en veiligheid te verbeteren die op veel Linux-distributies van toepassing zijn. diff --git a/i18n/nl/dns.md b/i18n/nl/dns.md index abb6da8e..7f11d7ef 100644 --- a/i18n/nl/dns.md +++ b/i18n/nl/dns.md @@ -2,6 +2,7 @@ title: "DNS-resolvers" icon: material/dns description: Dit zijn enkele versleutelde DNS-providers die wij aanbevelen, ter vervanging van de standaardconfiguratie van jouw ISP. +cover: dns.png --- Versleutelde DNS met servers van derden zou alleen moeten worden gebruikt om simpele [DNS-blokkering](https://en.wikipedia.org/wiki/DNS_blocking) te omzeilen en als je er zeker van bent dat er geen gevolgen zullen zijn. Versleutelde DNS zal je niet helpen jouw surfactiviteiten te verbergen. diff --git a/i18n/nl/email-clients.md b/i18n/nl/email-clients.md index dd3a7f93..01b136b4 100644 --- a/i18n/nl/email-clients.md +++ b/i18n/nl/email-clients.md @@ -2,6 +2,7 @@ title: "Email clients" icon: material/email-open description: Deze e-mailclients respecteren de privacy en ondersteunen OpenPGP e-mail versleuteling. +cover: email-clients.png --- Onze aanbevelingslijst bevat e-mailcliënten die zowel [OpenPGP](encryption.md#openpgp) als sterke authenticatie ondersteunen, zoals [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). Met OAuth kunt u [Multi-Factor Authentication](basics/multi-factor-authentication.md) gebruiken en accountdiefstal voorkomen. diff --git a/i18n/nl/email.md b/i18n/nl/email.md index a81a36be..669dc989 100644 --- a/i18n/nl/email.md +++ b/i18n/nl/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Diensten" icon: material/email description: Deze e-mailproviders bieden een uitstekende plaats om jouw e-mails veilig op te slaan, en vele bieden interoperabele OpenPGP versleuteling met andere providers. +cover: email.png --- E-mail is bijna een noodzaak voor het gebruik van elke online dienst, maar wij raden het niet aan voor gesprekken van persoon tot persoon. In plaats van e-mail te gebruiken om andere mensen te contacteren, kunt u overwegen een instant messenger te gebruiken die forward secrecy ondersteunt. diff --git a/i18n/nl/encryption.md b/i18n/nl/encryption.md index e70fbff7..4b5ad093 100644 --- a/i18n/nl/encryption.md +++ b/i18n/nl/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Versleutelingssoftware" icon: material/file-lock description: Encryptie van gegevens is de enige manier om te controleren wie er toegang toe heeft. Met deze tools kun je jouw e-mails en andere bestanden versleutelen. +cover: encryption.png --- Encryptie van gegevens is de enige manier om te controleren wie er toegang toe heeft. Als je momenteel geen encryptiesoftware gebruikt voor jouw harde schijf, e-mails of bestanden, moet je hier een optie kiezen. diff --git a/i18n/nl/file-sharing.md b/i18n/nl/file-sharing.md index 3b6954ab..7e0e18c3 100644 --- a/i18n/nl/file-sharing.md +++ b/i18n/nl/file-sharing.md @@ -2,6 +2,7 @@ title: "Bestanden delen en synchroniseren" icon: material/share-variant description: Ontdek hoe je jouw bestanden privé kunt delen tussen jouw apparaten, met jouw vrienden en familie, of anoniem online. +cover: file-sharing.png --- Ontdek hoe je jouw bestanden privé kunt delen tussen jouw apparaten, met jouw vrienden en familie, of anoniem online. diff --git a/i18n/nl/financial-services.md b/i18n/nl/financial-services.md index 7aa92cb1..a3e90737 100644 --- a/i18n/nl/financial-services.md +++ b/i18n/nl/financial-services.md @@ -1,6 +1,7 @@ --- title: Financiële diensten icon: material/bank +cover: financial-services.png --- Online betalen is een van de grootste uitdagingen voor privacy. Deze diensten kunnen je helpen jouw privacy te beschermen tegen handelaren en andere trackers, op voorwaarde dat je goed weet hoe je privébetalingen doeltreffend kunt verrichten. Wij raden je sterk aan eerst ons overzichtsartikel over betalingen te lezen voordat je aankopen doet: diff --git a/i18n/nl/frontends.md b/i18n/nl/frontends.md index a1f19d58..7a07acbd 100644 --- a/i18n/nl/frontends.md +++ b/i18n/nl/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: Deze open-source frontends voor verschillende internetdiensten geven je toegang tot inhoud zonder JavaScript of andere ergernissen. +cover: frontends.png --- Soms proberen diensten je te dwingen zich aan te melden voor een account door de toegang tot inhoud te blokkeren met vervelende popups. Ze kunnen ook breken zonder JavaScript. Met deze frontends kunt je deze beperkingen omzeilen. diff --git a/i18n/nl/mobile-browsers.md b/i18n/nl/mobile-browsers.md index 735d56d0..08113096 100644 --- a/i18n/nl/mobile-browsers.md +++ b/i18n/nl/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobiele browsers" icon: material/cellphone-information description: Deze browsers zijn wat we momenteel aanbevelen voor standaard/niet-anoniem internetten op jouw telefoon. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/nl/multi-factor-authentication.md b/i18n/nl/multi-factor-authentication.md index 200b0f3f..3f82ed56 100644 --- a/i18n/nl/multi-factor-authentication.md +++ b/i18n/nl/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: Deze tools helpen je jouw internetaccounts te beveiligen met Multi-Factor Authentication zonder jouw geheimen naar een derde partij te sturen. +cover: multi-factor-authentication.png --- ## Hardware Veiligheidssleutels diff --git a/i18n/nl/news-aggregators.md b/i18n/nl/news-aggregators.md index 786df229..4bd43148 100644 --- a/i18n/nl/news-aggregators.md +++ b/i18n/nl/news-aggregators.md @@ -2,6 +2,7 @@ title: "Nieuws Aggregators" icon: material/rss description: Met deze news aggregator clients kunt je op de hoogte blijven van jouw favoriete blogs en nieuwssites via internetstandaarden zoals RSS. +cover: news-aggregators.png --- Een [nieuwsaggregator](https://en.wikipedia.org/wiki/News_aggregator) is een manier om op de hoogte te blijven van jouw favoriete blogs en nieuwssites. diff --git a/i18n/nl/notebooks.md b/i18n/nl/notebooks.md index ead66cd8..30b05faa 100644 --- a/i18n/nl/notebooks.md +++ b/i18n/nl/notebooks.md @@ -2,6 +2,7 @@ title: "Notitieboekjes" icon: material/notebook-edit-outline description: Met deze versleutelde notitie-apps kun je je notities bijhouden zonder ze aan derden te geven. +cover: notebooks.png --- Houd jouw notities en aantekeningen bij zonder ze aan derden te geven. diff --git a/i18n/nl/passwords.md b/i18n/nl/passwords.md index 799fb8eb..4eb6f997 100644 --- a/i18n/nl/passwords.md +++ b/i18n/nl/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Wachtwoord managers" icon: material/form-textbox-password description: Met wachtwoord Managers kunt je wachtwoorden en andere geheimen veilig opslaan en beheren met behulp van een hoofdwachtwoord. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/nl/productivity.md b/i18n/nl/productivity.md index 72a97ff9..c824543a 100644 --- a/i18n/nl/productivity.md +++ b/i18n/nl/productivity.md @@ -2,6 +2,7 @@ title: "Productiviteitshulpmiddelen" icon: material/file-sign description: De meeste online office suites ondersteunen geen E2EE, wat betekent dat de cloud provider toegang heeft tot alles wat je doet. +cover: productivity.png --- De meeste online office suites ondersteunen geen E2EE, wat betekent dat de cloud provider toegang heeft tot alles wat je doet. Het privacybeleid kan jouw rechten wettelijk beschermen, maar het voorziet niet in technische toegangsbeperkingen. diff --git a/i18n/nl/real-time-communication.md b/i18n/nl/real-time-communication.md index 48b25d56..3d1afbaf 100644 --- a/i18n/nl/real-time-communication.md +++ b/i18n/nl/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communicatie" icon: material/chat-processing description: Andere instant messengers maken al je privégesprekken beschikbaar voor het bedrijf dat ze beheert. +cover: real-time-communication.png --- Dit zijn onze aanbevelingen voor versleutelde real-time communicatie. diff --git a/i18n/nl/router.md b/i18n/nl/router.md index 2f86eef4..9336a514 100644 --- a/i18n/nl/router.md +++ b/i18n/nl/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: Deze alternatieve besturingssystemen kunnen worden gebruikt om jouw router of Wi-Fi-toegangspunt te beveiligen. +cover: router.png --- Hieronder staan een paar alternatieve besturingssystemen, die gebruikt kunnen worden op routers, Wi-Fi access points, enz. diff --git a/i18n/nl/search-engines.md b/i18n/nl/search-engines.md index fd755cce..d722ab88 100644 --- a/i18n/nl/search-engines.md +++ b/i18n/nl/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Zoekmachines" icon: material/search-web description: Deze privacy respecterende zoekmachines bouwen geen advertentieprofiel op basis van jouw zoekopdrachten. +cover: search-engines.png --- Gebruik een zoekmachine die geen advertentieprofiel opbouwt op basis van jouw zoekopdrachten. diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md index bc6d0a08..9ba3d51a 100644 --- a/i18n/nl/tor.md +++ b/i18n/nl/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Netwerk" icon: simple/torproject description: Bescherm je surf gedrag tegen pottenkijkers door gebruik te maken van het Tor netwerk, een beveiligd netwerk dat censuur omzeilt. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/nl/video-streaming.md b/i18n/nl/video-streaming.md index 17fed8b7..c2b332d6 100644 --- a/i18n/nl/video-streaming.md +++ b/i18n/nl/video-streaming.md @@ -2,6 +2,7 @@ title: "Videostreaming" icon: material/video-wireless description: Met deze netwerken kunt je internet content streamen zonder een advertentieprofiel op te bouwen op basis van jouw interesses. +cover: video-streaming.png --- Het grootste gevaar bij het gebruik van een videostreamingplatform is dat uw streaminggewoonten en abonneelijsten kunnen worden gebruikt om u te profileren. Je zou deze tools moeten combineren met een [VPN](vpn.md) of [Tor](https://www.torproject.org/) om het moeilijker te maken je gebruik te profileren. diff --git a/i18n/nl/vpn.md b/i18n/nl/vpn.md index 38798dea..983f2536 100644 --- a/i18n/nl/vpn.md +++ b/i18n/nl/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN-diensten" icon: material/vpn description: Dit zijn de beste VPN-diensten om jouw privacy en veiligheid online te beschermen. Vind hier een provider die er niet op uit is om je te bespioneren. +cover: vpn.png --- Als je op zoek bent naar extra **privacy** van uw ISP, op een openbaar Wi-Fi-netwerk, of tijdens het torrenten van bestanden, kan een VPN de oplossing voor je zijn, zolang je de risico's ervan begrijpt. Wij denken dat deze aanbieders een stuk beter zijn dan de rest: diff --git a/i18n/pl/android.md b/i18n/pl/android.md index a9257531..175c485f 100644 --- a/i18n/pl/android.md +++ b/i18n/pl/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'fontawesome/brands/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/pl/calendar.md b/i18n/pl/calendar.md index 4d5b9f55..1a708023 100644 --- a/i18n/pl/calendar.md +++ b/i18n/pl/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md index 133b3704..de9d327b 100644 --- a/i18n/pl/cloud.md +++ b/i18n/pl/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/pl/cryptocurrency.md b/i18n/pl/cryptocurrency.md index 99b7f241..a359373e 100644 --- a/i18n/pl/cryptocurrency.md +++ b/i18n/pl/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pl/data-redaction.md b/i18n/pl/data-redaction.md index 5da43dcf..a2f67fa9 100644 --- a/i18n/pl/data-redaction.md +++ b/i18n/pl/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/pl/desktop-browsers.md b/i18n/pl/desktop-browsers.md index 72a6246b..a1899514 100644 --- a/i18n/pl/desktop-browsers.md +++ b/i18n/pl/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/pl/desktop.md b/i18n/pl/desktop.md index 7466b4b8..ece6024e 100644 --- a/i18n/pl/desktop.md +++ b/i18n/pl/desktop.md @@ -2,6 +2,7 @@ title: "Magazyny chmurowe" icon: fontawesome/brands/linux description: Dystrybucje systemu Linux są powszechnie polecane, jeśli chodzi o ochronę prywatności oraz wolne oprogramowanie. +cover: desktop.png --- Dystrybucje systemu Linux są powszechnie polecane, jeśli chodzi o ochronę prywatności oraz wolne oprogramowanie. Jeśli nie korzystasz jeszcze z systemu Linux, poniżej znajdziesz kilka dystrybucji, które polecamy wypróbować oraz kilka ogólnych porad dotyczących lepszej prywatności i bezpieczeństwa, które mają zastosowanie dla wielu dystrybucji systemu Linux. diff --git a/i18n/pl/dns.md b/i18n/pl/dns.md index 0275f479..4fab9003 100644 --- a/i18n/pl/dns.md +++ b/i18n/pl/dns.md @@ -2,6 +2,7 @@ title: "Rekursywne serwery nazw" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Szyfrowany DNS nie pomoże Ci w ukryciu jakiejkolwiek aktywności w Internecie. diff --git a/i18n/pl/email-clients.md b/i18n/pl/email-clients.md index db8baa99..19108dff 100644 --- a/i18n/pl/email-clients.md +++ b/i18n/pl/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/pl/email.md b/i18n/pl/email.md index 7d2e4aeb..c475d54d 100644 --- a/i18n/pl/email.md +++ b/i18n/pl/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/pl/encryption.md b/i18n/pl/encryption.md index 9ff0dd41..3fcf28b5 100644 --- a/i18n/pl/encryption.md +++ b/i18n/pl/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Oprogramowanie szyfrujące" icon: material/file-lock description: Szyfrowanie danych to jedyny sposób na kontrolowanie tego, kto ma do nich dostęp. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Szyfrowanie danych to jedyny sposób na kontrolowanie tego, kto ma do nich dostęp. Jeśli obecnie nie używasz oprogramowania szyfrującego dla swojego dysku, e-maili lub plików, możesz wybrać jedną z tych opcji. diff --git a/i18n/pl/file-sharing.md b/i18n/pl/file-sharing.md index 1868bf2f..fd618b96 100644 --- a/i18n/pl/file-sharing.md +++ b/i18n/pl/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Dowiedz się, jak prywatnie udostępniać piki pomiędzy swoimi urządzeniami, ze znajomymi lub rodziną lub anonimowo w sieci. +cover: file-sharing.png --- Dowiedz się, jak prywatnie udostępniać piki pomiędzy swoimi urządzeniami, ze znajomymi lub rodziną lub anonimowo w sieci. diff --git a/i18n/pl/financial-services.md b/i18n/pl/financial-services.md index 8dfff6f4..34af16f9 100644 --- a/i18n/pl/financial-services.md +++ b/i18n/pl/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pl/frontends.md b/i18n/pl/frontends.md index 12b29bfb..05e4d6f6 100644 --- a/i18n/pl/frontends.md +++ b/i18n/pl/frontends.md @@ -2,6 +2,7 @@ title: "Menedżery haseł" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/pl/mobile-browsers.md b/i18n/pl/mobile-browsers.md index 500e7cf2..0316ad63 100644 --- a/i18n/pl/mobile-browsers.md +++ b/i18n/pl/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Przeglądarki mobilne" icon: octicons/device-mobile-16 description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/pl/multi-factor-authentication.md b/i18n/pl/multi-factor-authentication.md index 18fd3ae2..8ebc157f 100644 --- a/i18n/pl/multi-factor-authentication.md +++ b/i18n/pl/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/pl/news-aggregators.md b/i18n/pl/news-aggregators.md index 8068bf49..9724dc5b 100644 --- a/i18n/pl/news-aggregators.md +++ b/i18n/pl/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/pl/notebooks.md b/i18n/pl/notebooks.md index 14cba58b..49497a7a 100644 --- a/i18n/pl/notebooks.md +++ b/i18n/pl/notebooks.md @@ -2,6 +2,7 @@ title: "Notatniki" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Prowadź swoje notatniki i dzienniki bez udostępniania ich stronom trzecim. diff --git a/i18n/pl/passwords.md b/i18n/pl/passwords.md index 7da1c50f..3ed6cb72 100644 --- a/i18n/pl/passwords.md +++ b/i18n/pl/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/pl/productivity.md b/i18n/pl/productivity.md index 1b6b6db2..fcec13c8 100644 --- a/i18n/pl/productivity.md +++ b/i18n/pl/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md index 027580eb..ccd86cb4 100644 --- a/i18n/pl/real-time-communication.md +++ b/i18n/pl/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/pl/router.md b/i18n/pl/router.md index 7653b9ac..ebed3e06 100644 --- a/i18n/pl/router.md +++ b/i18n/pl/router.md @@ -2,6 +2,7 @@ title: "Oprogramowanie routera" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Poniżej wymieniono kilka alternatywnych systemów operacyjnych, które możesz zainstalować na swoim routerze, punkcie dostępowym Wi-Fi itp. diff --git a/i18n/pl/search-engines.md b/i18n/pl/search-engines.md index d29f057c..191501e3 100644 --- a/i18n/pl/search-engines.md +++ b/i18n/pl/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/pl/tor.md b/i18n/pl/tor.md index 3e9ee26d..7e50b260 100644 --- a/i18n/pl/tor.md +++ b/i18n/pl/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/pl/video-streaming.md b/i18n/pl/video-streaming.md index a89a6ffd..fd237e2f 100644 --- a/i18n/pl/video-streaming.md +++ b/i18n/pl/video-streaming.md @@ -2,6 +2,7 @@ title: "Strumieniowanie filmów" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- Podstawowym zagrożeniem związanym z korzystaniem z platformy do strumieniowania filmów jest to, że Twoje nawyki dotyczące strumieniowania oraz listy subskrypcyjne mogą zostać wykorzystane do profilowania Ciebie. Warto połączyć te narzędzia z [VPN](vpn.md) lub [Tor](https://www.torproject.org/), aby utrudnić profilowanie. diff --git a/i18n/pl/vpn.md b/i18n/pl/vpn.md index c0ea264a..3ef1ae83 100644 --- a/i18n/pl/vpn.md +++ b/i18n/pl/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/pt-BR/android.md b/i18n/pt-BR/android.md index 7e0e1388..576201ec 100644 --- a/i18n/pt-BR/android.md +++ b/i18n/pt-BR/android.md @@ -3,6 +3,7 @@ meta_title: "Recomendações para Android: GrapheneOS e DivestOS — Privacy Gui title: "Android" icon: 'simple/android' description: Você pode substituir o sistema operacional do seu celular Android por essas alternativas seguras e que respeitam a privacidade. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/calendar.md b/i18n/pt-BR/calendar.md index 89b9e9ad..64f61552 100644 --- a/i18n/pt-BR/calendar.md +++ b/i18n/pt-BR/calendar.md @@ -2,6 +2,7 @@ title: "Agenda/Calendário Sincronizado" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md index 09396411..1443bde8 100644 --- a/i18n/pt-BR/cloud.md +++ b/i18n/pt-BR/cloud.md @@ -3,6 +3,7 @@ meta_title: "Melhores Fornecedores Privados e Seguros de Armazenamento em Nuvem title: "Armazenamento em nuvem" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/pt-BR/cryptocurrency.md b/i18n/pt-BR/cryptocurrency.md index 3d765c04..8e7a2697 100644 --- a/i18n/pt-BR/cryptocurrency.md +++ b/i18n/pt-BR/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Criptomoedas icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pt-BR/data-redaction.md b/i18n/pt-BR/data-redaction.md index 39b14f11..4dd9a4d0 100644 --- a/i18n/pt-BR/data-redaction.md +++ b/i18n/pt-BR/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/pt-BR/desktop-browsers.md b/i18n/pt-BR/desktop-browsers.md index d899ce81..3fc7f1c1 100644 --- a/i18n/pt-BR/desktop-browsers.md +++ b/i18n/pt-BR/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Navegadores de Internet que Respeitam a Privacidade para PC e Mac title: "Navegadores Desktop" icon: material/laptop description: Estes navegadores de internet dão uma proteção à privacidade mais forte do que o Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/desktop.md b/i18n/pt-BR/desktop.md index 97020f7e..17457f00 100644 --- a/i18n/pt-BR/desktop.md +++ b/i18n/pt-BR/desktop.md @@ -2,6 +2,7 @@ title: "Computador/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/pt-BR/dns.md b/i18n/pt-BR/dns.md index 33452954..965fe901 100644 --- a/i18n/pt-BR/dns.md +++ b/i18n/pt-BR/dns.md @@ -2,6 +2,7 @@ title: "Introdução ao DNS" icon: material/dns description: Estes são alguns provedores de DNS criptografados para os quais recomendamos mudar, para substituir a configuração padrão de seu ISP. +cover: dns.png --- DNS criptografado com servidores de terceiros só deve ser usado para contornar o [bloqueio básico de DNS](https://en.wikipedia.org/wiki/DNS_blocking) quando você pode ter certeza de que não haverá nenhuma consequência. DNS criptografado não ajudará você a esconder nenhuma de suas atividades de navegação. diff --git a/i18n/pt-BR/email-clients.md b/i18n/pt-BR/email-clients.md index 715a2194..9fe74f1c 100644 --- a/i18n/pt-BR/email-clients.md +++ b/i18n/pt-BR/email-clients.md @@ -2,6 +2,7 @@ title: "Clientes de Email" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/pt-BR/email.md b/i18n/pt-BR/email.md index 6234c083..dd7c89f5 100644 --- a/i18n/pt-BR/email.md +++ b/i18n/pt-BR/email.md @@ -3,6 +3,7 @@ meta_title: "Recomendações de E-mail Privado Criptografado — Privacy Guides" title: "Serviços de Email" icon: material/email description: Esses provedores de email oferecem um ótimo lugar para armazenar seus emails de forma segura, e muitos oferecem criptografia OpenPGP compatível com outros provedores. +cover: email.png --- O "email" é praticamente uma necessidade para usar qualquer serviço “online”, contudo não o recomendamos para conversas pessoais. Ao invés de utilizar email para falar com outras pessoas, considere utilizar um meio de mensagens instantâneas que suporte sigilo encaminhado. diff --git a/i18n/pt-BR/encryption.md b/i18n/pt-BR/encryption.md index 63e4b1fc..e8f27883 100644 --- a/i18n/pt-BR/encryption.md +++ b/i18n/pt-BR/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Softwares de Criptografia" icon: material/file-lock description: A criptografia de dados é a única maneira de controlar quem pode acessá-los. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- A criptografia de dados é a única maneira de controlar quem pode acessá-los. Se você atualmente não está usando “software” de criptografia para seu disco rígido, e-mails ou arquivos, você deve escolher uma opção aqui. diff --git a/i18n/pt-BR/file-sharing.md b/i18n/pt-BR/file-sharing.md index bcad6115..83af424b 100644 --- a/i18n/pt-BR/file-sharing.md +++ b/i18n/pt-BR/file-sharing.md @@ -2,6 +2,7 @@ title: "Compartilhamento e Sincronização de Arquivos" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/pt-BR/financial-services.md b/i18n/pt-BR/financial-services.md index 8eac8dab..c0028cc9 100644 --- a/i18n/pt-BR/financial-services.md +++ b/i18n/pt-BR/financial-services.md @@ -1,6 +1,7 @@ --- title: Serviços Financeiros icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pt-BR/frontends.md b/i18n/pt-BR/frontends.md index a8c76f2d..137275be 100644 --- a/i18n/pt-BR/frontends.md +++ b/i18n/pt-BR/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/pt-BR/mobile-browsers.md b/i18n/pt-BR/mobile-browsers.md index f14e1f27..39469100 100644 --- a/i18n/pt-BR/mobile-browsers.md +++ b/i18n/pt-BR/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/multi-factor-authentication.md b/i18n/pt-BR/multi-factor-authentication.md index a0151c7b..9a2b6160 100644 --- a/i18n/pt-BR/multi-factor-authentication.md +++ b/i18n/pt-BR/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/pt-BR/news-aggregators.md b/i18n/pt-BR/news-aggregators.md index fd80fb27..5c94d636 100644 --- a/i18n/pt-BR/news-aggregators.md +++ b/i18n/pt-BR/news-aggregators.md @@ -2,6 +2,7 @@ title: "Agregadores de Notícias" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/pt-BR/notebooks.md b/i18n/pt-BR/notebooks.md index 9277c1ac..3aef14e3 100644 --- a/i18n/pt-BR/notebooks.md +++ b/i18n/pt-BR/notebooks.md @@ -2,6 +2,7 @@ title: "Blocos de Notas" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Mantenha o controle de suas anotações e registros de atividades sem entregá-los a terceiros. diff --git a/i18n/pt-BR/passwords.md b/i18n/pt-BR/passwords.md index b1ec8a72..5ccb7f54 100644 --- a/i18n/pt-BR/passwords.md +++ b/i18n/pt-BR/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Gerenciadores de Senhas" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/productivity.md b/i18n/pt-BR/productivity.md index cabea353..19501e5f 100644 --- a/i18n/pt-BR/productivity.md +++ b/i18n/pt-BR/productivity.md @@ -2,6 +2,7 @@ title: "Ferramentas de Produtividade" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md index 95ab1b7d..8c7d29c3 100644 --- a/i18n/pt-BR/real-time-communication.md +++ b/i18n/pt-BR/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "Melhores Mensageiros Instantâneos Privados — Privacy Guides" title: "Comunicação em Tempo Real" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/pt-BR/router.md b/i18n/pt-BR/router.md index 6fae038a..a2be3290 100644 --- a/i18n/pt-BR/router.md +++ b/i18n/pt-BR/router.md @@ -2,6 +2,7 @@ title: "Firmware para Roteadores" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Abaixo estão alguns sistemas operacionais alternativos, que podem ser usados em roteadores, pontos de acesso Wi-Fi, etc. diff --git a/i18n/pt-BR/search-engines.md b/i18n/pt-BR/search-engines.md index 0b01a9c7..8ac9ec1e 100644 --- a/i18n/pt-BR/search-engines.md +++ b/i18n/pt-BR/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Mecanismos de Pesquisa Recomendados: Alternativas Anônimas ao Goog title: "Motores de busca" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/pt-BR/tor.md b/i18n/pt-BR/tor.md index 8c7e837e..be7c0c35 100644 --- a/i18n/pt-BR/tor.md +++ b/i18n/pt-BR/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Rede Tor" icon: simple/torproject description: Proteja a sua navegação na Internet de olhares curiosos utilizando a rede Tor, uma rede segura que contorna a censura. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/video-streaming.md b/i18n/pt-BR/video-streaming.md index 8f8ebd0b..fb323dfe 100644 --- a/i18n/pt-BR/video-streaming.md +++ b/i18n/pt-BR/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/pt-BR/vpn.md b/i18n/pt-BR/vpn.md index 8f36ec0b..50d35659 100644 --- a/i18n/pt-BR/vpn.md +++ b/i18n/pt-BR/vpn.md @@ -3,6 +3,7 @@ meta_title: "Recomendações e Comparação de Serviços VPN Privados, Sem Patro title: "Serviços de VPN" icon: material/vpn description: Estes são os melhores serviços VPN para proteger sua privacidade e segurança on-line. Encontre aqui um provedor que não tem como objetivo espionar você. +cover: vpn.png --- Se você está procurando mais **privacidade** do seu provedor de internet (ISP), ou em uma rede Wi-Fi pública, ou ao fazer torrent de arquivos, uma VPN pode ser a solução para você, desde que entenda os riscos envolvidos. Nós entendemos que estes provedores estão acima dos demais: diff --git a/i18n/pt/android.md b/i18n/pt/android.md index 78dcec4c..1d292a99 100644 --- a/i18n/pt/android.md +++ b/i18n/pt/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/pt/calendar.md b/i18n/pt/calendar.md index de2f42e9..2cd9d6f7 100644 --- a/i18n/pt/calendar.md +++ b/i18n/pt/calendar.md @@ -2,6 +2,7 @@ title: "Clientes de e-mail" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md index ca657794..b3613c88 100644 --- a/i18n/pt/cloud.md +++ b/i18n/pt/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Email" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/pt/cryptocurrency.md b/i18n/pt/cryptocurrency.md index cbe3c5af..b2346a9c 100644 --- a/i18n/pt/cryptocurrency.md +++ b/i18n/pt/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pt/data-redaction.md b/i18n/pt/data-redaction.md index caea098c..d11450f1 100644 --- a/i18n/pt/data-redaction.md +++ b/i18n/pt/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Ferramentas de encriptação" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- Ao partilhar ficheiros, certifique-se de que remove os metadados associados. Os arquivos de imagem geralmente incluem [EXIF](https://en.wikipedia.org/wiki/Exif) dados. As fotos às vezes até incluem [GPS](https://en.wikipedia.org/wiki/Global_Positioning_System) coordenadas nos metadados do arquivo. diff --git a/i18n/pt/desktop-browsers.md b/i18n/pt/desktop-browsers.md index a460c130..0410eb6c 100644 --- a/i18n/pt/desktop-browsers.md +++ b/i18n/pt/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/pt/desktop.md b/i18n/pt/desktop.md index d77baa96..7df7e617 100644 --- a/i18n/pt/desktop.md +++ b/i18n/pt/desktop.md @@ -2,6 +2,7 @@ title: "Armazenamento em nuvem" icon: fontawesome/brands/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/pt/dns.md b/i18n/pt/dns.md index 7726e2cc..5a3b7efa 100644 --- a/i18n/pt/dns.md +++ b/i18n/pt/dns.md @@ -2,6 +2,7 @@ title: "Introdução ao DNS" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. DNS criptografado não o ajudará a ocultar qualquer atividade de navegação. diff --git a/i18n/pt/email-clients.md b/i18n/pt/email-clients.md index 49ff7135..f7bd3eb9 100644 --- a/i18n/pt/email-clients.md +++ b/i18n/pt/email-clients.md @@ -2,6 +2,7 @@ title: "Partilha de ficheiros" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Nossa lista de recomendações contém clientes de e-mail que suportam tanto [OpenPGP](/encryption/#openpgp) e autenticação forte como [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth permite-lhe utilizar [Multi-Factor Authentication](/multi-factor-authentication) e prevenir o roubo de contas. diff --git a/i18n/pt/email.md b/i18n/pt/email.md index 574a65c3..8d442f38 100644 --- a/i18n/pt/email.md +++ b/i18n/pt/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Encontre um provedor de e-mail seguro que manterá sua privacidade em mente. Não se contente com plataformas suportadas por anúncios. diff --git a/i18n/pt/encryption.md b/i18n/pt/encryption.md index c2237df7..c545080e 100644 --- a/i18n/pt/encryption.md +++ b/i18n/pt/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Software de encriptação" icon: material/file-lock description: A encriptação de dados é a única forma de controlar quem pode acessá-los. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- A encriptação de dados é a única forma de controlar quem pode acessá-los. Se você não estiver usando software de criptografia para o seu disco rígido, e-mails ou arquivos, você deve escolher uma opção aqui. diff --git a/i18n/pt/file-sharing.md b/i18n/pt/file-sharing.md index b6081521..43ba2df0 100644 --- a/i18n/pt/file-sharing.md +++ b/i18n/pt/file-sharing.md @@ -2,6 +2,7 @@ title: "Ferramentas de Autenticação Multi-Factor" icon: material/share-variant description: Descubra como partilhar os seus ficheiros em privado entre os seus dispositivos, com os seus amigos e família, ou anonimamente online. +cover: file-sharing.png --- Descubra como partilhar os seus ficheiros em privado entre os seus dispositivos, com os seus amigos e família, ou anonimamente online. diff --git a/i18n/pt/financial-services.md b/i18n/pt/financial-services.md index 9d376c95..2911911f 100644 --- a/i18n/pt/financial-services.md +++ b/i18n/pt/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pt/frontends.md b/i18n/pt/frontends.md index 524af675..f9735efa 100644 --- a/i18n/pt/frontends.md +++ b/i18n/pt/frontends.md @@ -2,6 +2,7 @@ title: "Gestores de senhas" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/pt/mobile-browsers.md b/i18n/pt/mobile-browsers.md index 4d25e412..7981de7a 100644 --- a/i18n/pt/mobile-browsers.md +++ b/i18n/pt/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/pt/multi-factor-authentication.md b/i18n/pt/multi-factor-authentication.md index ef0bcbf9..e823e6ef 100644 --- a/i18n/pt/multi-factor-authentication.md +++ b/i18n/pt/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Autenticadores Multi-Factor" icon: 'O uso de AMF forte pode parar mais de 99% dos acessos não autorizados à conta, e é fácil de configurar nos serviços que você já usa.' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Chaves de Segurança de Hardware diff --git a/i18n/pt/news-aggregators.md b/i18n/pt/news-aggregators.md index b28513ed..98dc9ce2 100644 --- a/i18n/pt/news-aggregators.md +++ b/i18n/pt/news-aggregators.md @@ -2,6 +2,7 @@ title: "Comunicação em Tempo Real" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/pt/notebooks.md b/i18n/pt/notebooks.md index 84e154d1..2f5a9639 100644 --- a/i18n/pt/notebooks.md +++ b/i18n/pt/notebooks.md @@ -2,6 +2,7 @@ title: "Cadernos de notas" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Mantenha um registo das suas notas e diários sem os entregar a terceiros. diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md index 38e5edd3..5b650e84 100644 --- a/i18n/pt/passwords.md +++ b/i18n/pt/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Redes Auto-Contidas" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/pt/productivity.md b/i18n/pt/productivity.md index c00cc264..1d739a3b 100644 --- a/i18n/pt/productivity.md +++ b/i18n/pt/productivity.md @@ -2,6 +2,7 @@ title: "Clientes de streaming de vídeo" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md index 922802b3..ed483753 100644 --- a/i18n/pt/real-time-communication.md +++ b/i18n/pt/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Clientes de streaming de vídeo" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/pt/router.md b/i18n/pt/router.md index 510b26a8..19cd0dae 100644 --- a/i18n/pt/router.md +++ b/i18n/pt/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Abaixo estão alguns sistemas operacionais alternativos, que podem ser usados em roteadores, pontos de acesso Wi-Fi, etc. diff --git a/i18n/pt/search-engines.md b/i18n/pt/search-engines.md index b38dc1ab..af83d15d 100644 --- a/i18n/pt/search-engines.md +++ b/i18n/pt/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Motores de Busca" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use um motor de busca que não construa um perfil publicitário baseado nas suas pesquisas. diff --git a/i18n/pt/tor.md b/i18n/pt/tor.md index 84055ad4..7de9aecc 100644 --- a/i18n/pt/tor.md +++ b/i18n/pt/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/pt/video-streaming.md b/i18n/pt/video-streaming.md index df2d5f54..239edb71 100644 --- a/i18n/pt/video-streaming.md +++ b/i18n/pt/video-streaming.md @@ -2,6 +2,7 @@ title: "Transmissão de vídeo" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- A principal ameaça ao usar uma plataforma de streaming de vídeo é que os seus hábitos de streaming e listas de assinaturas podem ser usados para traçar o seu perfil. Você deve combinar estas ferramentas com um [VPN](/vpn) ou [Tor](https://www.torproject.org/) para tornar mais difícil o perfil do seu uso. diff --git a/i18n/pt/vpn.md b/i18n/pt/vpn.md index de061506..0a1ebe5c 100644 --- a/i18n/pt/vpn.md +++ b/i18n/pt/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/ru/android.md b/i18n/ru/android.md index 18a0b998..782669b9 100644 --- a/i18n/ru/android.md +++ b/i18n/ru/android.md @@ -3,6 +3,7 @@ meta_title: "Рекомендации по Android: GrapheneOS и DivestOS - Pri title: "Android" icon: 'simple/android' description: Вы можете заменить операционную систему на своем Android на эти безопасные и конфиденциальные альтернативы. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/ru/calendar.md b/i18n/ru/calendar.md index eee93684..b6684664 100644 --- a/i18n/ru/calendar.md +++ b/i18n/ru/calendar.md @@ -2,6 +2,7 @@ title: "Синхронизация календаря" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Ваши события в календаре - одни из самых конфиденциальных данных. Используйте продукты с поддержкой автоматического E2EE, чтобы предотвратить их чтение провайдером. diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md index af844c3d..d672b8a7 100644 --- a/i18n/ru/cloud.md +++ b/i18n/ru/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Электронная почта" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Многие сервисы облачного хранилища требуют от вас полного доверия, что они не будут просматривать ваши файлы. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/ru/cryptocurrency.md b/i18n/ru/cryptocurrency.md index 1aa5bc72..2c3e775f 100644 --- a/i18n/ru/cryptocurrency.md +++ b/i18n/ru/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Криптовалюта icon: material/bank-circle +cover: cryptocurrency.png --- Платежи в Интернете - одна из самых серьезных проблем, связанных с конфиденциальностью. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ru/data-redaction.md b/i18n/ru/data-redaction.md index 98d07d06..2b606133 100644 --- a/i18n/ru/data-redaction.md +++ b/i18n/ru/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Инструменты для шифрования" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- Когда вы делитесь с кем-то файлами, то не забудьте удалить связанные с ними метаданные. Файлы изображений обычно содержат [данные EXIF](https://ru.wikipedia.org/wiki/Exif). Иногда фотографии даже включают ваши [GPS](https://ru.wikipedia.org/wiki/GPS) координаты в метаданные файла. diff --git a/i18n/ru/desktop-browsers.md b/i18n/ru/desktop-browsers.md index 6af065da..b9811f40 100644 --- a/i18n/ru/desktop-browsers.md +++ b/i18n/ru/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ru/desktop.md b/i18n/ru/desktop.md index 5b9320e4..d6a3fe6f 100644 --- a/i18n/ru/desktop.md +++ b/i18n/ru/desktop.md @@ -2,6 +2,7 @@ title: "Облачные хранилища" icon: fontawesome/brands/linux description: Дистрибутивы Linux часто рекомендуются для защиты конфиденциальности и свободы пользователей. +cover: desktop.png --- Дистрибутивы Linux часто рекомендуются для защиты конфиденциальности и свободы пользователей. Если вы еще не используете Linux, ниже приведены некоторые дистрибутивы, которые мы рекомендуем попробовать, а также несколько общих советов по улучшению конфиденциальности и безопасности, которые применимы ко многим дистрибутивам Linux. diff --git a/i18n/ru/dns.md b/i18n/ru/dns.md index 20a020ad..f93866df 100644 --- a/i18n/ru/dns.md +++ b/i18n/ru/dns.md @@ -2,6 +2,7 @@ title: "DNS-провайдеры" icon: material/dns description: Здесь показаны некоторые DNS-провайдеры с поддержкой шифрования, к которым мы рекомендуем вам перейти, заменив конфигурацию вашего интернет-провайдера по умолчанию. +cover: dns.png --- Зашифрованный DNS со сторонними серверами следует использовать только для обхода базовой [блокировки DNS](https://en.wikipedia.org/wiki/DNS_blocking), если вы уверены, что это не повлечет за собой никаких последствий. Зашифрованный DNS не поможет вам скрыть какую-либо активность в интернете. diff --git a/i18n/ru/email-clients.md b/i18n/ru/email-clients.md index 9ff2ecf6..3da4a84a 100644 --- a/i18n/ru/email-clients.md +++ b/i18n/ru/email-clients.md @@ -2,6 +2,7 @@ title: "Обмен Файлами" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Наш список рекомендаций содержит только почтовые клиенты, которые поддерживают [OpenPGP](/encryption/#openpgp) и безопасную аутентификацию (например, [OAuth](https://ru.wikipedia.org/wiki/OAuth)). OAuth позволяет использовать [многофакторную аутентификацию](/multi-factor-authentication) и предотвратить кражу учетных записей. diff --git a/i18n/ru/email.md b/i18n/ru/email.md index b45b8f4c..c13755d8 100644 --- a/i18n/ru/email.md +++ b/i18n/ru/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Электронная почта" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Электронная почта практически всегда необходима для использования любого онлайн-сервиса, однако мы не рекомендуем использовать её для общения с людьми. Вместо того, чтобы использовать электронную почту для связи с другими людьми, мы советуем использовать мессенджеры, которые поддерживают прямую секретность. diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md index 8ca0bef9..cf952adb 100644 --- a/i18n/ru/encryption.md +++ b/i18n/ru/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Инструменты для шифрования" icon: material/file-lock description: Шифрование данных - единственный способ контролировать доступ к ним. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Шифрование данных - единственный способ контролировать доступ к ним. Если вы еще не используете какие-либо инструменты шифрования диска, электронной почты или файлов, то вы можете выбрать один из них тут. diff --git a/i18n/ru/file-sharing.md b/i18n/ru/file-sharing.md index dab56bbf..6939469b 100644 --- a/i18n/ru/file-sharing.md +++ b/i18n/ru/file-sharing.md @@ -2,6 +2,7 @@ title: "Синхронизация и обмен файлами" icon: material/share-variant description: Узнайте, как конфиденциально обмениваться файлами между устройствами, с друзьями и родственниками или анонимно в Интернете. +cover: file-sharing.png --- Узнайте, как конфиденциально обмениваться файлами между устройствами, с друзьями и родственниками или анонимно в Интернете. diff --git a/i18n/ru/financial-services.md b/i18n/ru/financial-services.md index 4c6b0b1c..2d2cc4db 100644 --- a/i18n/ru/financial-services.md +++ b/i18n/ru/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ru/frontends.md b/i18n/ru/frontends.md index 9cacbfa8..ccc0ad87 100644 --- a/i18n/ru/frontends.md +++ b/i18n/ru/frontends.md @@ -2,6 +2,7 @@ title: "Менеджеры паролей" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md index dacdc41e..47b88c75 100644 --- a/i18n/ru/mobile-browsers.md +++ b/i18n/ru/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Мобильные веб-браузеры для Android и iOS, title: "Мобильные браузеры" icon: material/cellphone-information description: Мы рекомендуем эти браузеры для обычного/неанонимного интернет-браузинга на вашем телефоне. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/ru/multi-factor-authentication.md b/i18n/ru/multi-factor-authentication.md index 3661c56a..7ca66306 100644 --- a/i18n/ru/multi-factor-authentication.md +++ b/i18n/ru/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Многофакторная аутентификация" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Аппаратные ключи безопасности diff --git a/i18n/ru/news-aggregators.md b/i18n/ru/news-aggregators.md index 9b8a7622..ab695813 100644 --- a/i18n/ru/news-aggregators.md +++ b/i18n/ru/news-aggregators.md @@ -2,6 +2,7 @@ title: "Мессенджеры" icon: octicons/rss-24 description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/ru/notebooks.md b/i18n/ru/notebooks.md index e98a440a..aa3a1202 100644 --- a/i18n/ru/notebooks.md +++ b/i18n/ru/notebooks.md @@ -2,6 +2,7 @@ title: "Заметки" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Сохраняйте свои заметки и дневники, не передавая их третьим лицам. diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md index 9d888cff..b1fb8f8a 100644 --- a/i18n/ru/passwords.md +++ b/i18n/ru/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Менеджеры паролей" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/ru/productivity.md b/i18n/ru/productivity.md index 948919ce..45599db7 100644 --- a/i18n/ru/productivity.md +++ b/i18n/ru/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/ru/real-time-communication.md b/i18n/ru/real-time-communication.md index 0bbc4cfb..fddb9f9e 100644 --- a/i18n/ru/real-time-communication.md +++ b/i18n/ru/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Мессенджеры" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/ru/router.md b/i18n/ru/router.md index 8fd062a2..550a8304 100644 --- a/i18n/ru/router.md +++ b/i18n/ru/router.md @@ -2,6 +2,7 @@ title: "Прошивки для роутера" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Ниже приведены альтернативные операционные системы, которые могут использоваться на роутерах, точках доступа Wi-Fi и т. п. diff --git a/i18n/ru/search-engines.md b/i18n/ru/search-engines.md index e7610b1e..19b2d41b 100644 --- a/i18n/ru/search-engines.md +++ b/i18n/ru/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Поисковые системы" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Используйте поисковую систему, которая не строит рекламный профиль на основе ваших запросов. diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md index 0b5a6046..fa2b5273 100644 --- a/i18n/ru/tor.md +++ b/i18n/ru/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Сеть Tor" icon: simple/torproject description: Защитите свой интернет-сёрфинг от посторонних глаз, используя сеть Tor - безопасную сеть, обходящую цензуру. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/ru/video-streaming.md b/i18n/ru/video-streaming.md index 99c85456..1b2196b4 100644 --- a/i18n/ru/video-streaming.md +++ b/i18n/ru/video-streaming.md @@ -2,6 +2,7 @@ title: "Видеохостинги" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- Основная угроза при использовании платформ потокового видео заключается в том, что ваши интересы и списки подписчиков могут быть использованы чтобы отслеживать вас. Вам следует сочетать эти инструменты с [VPN](/vpn) или [Tor](https://www.torproject.org/), чтобы усложнить отслеживание вашего использования. diff --git a/i18n/ru/vpn.md b/i18n/ru/vpn.md index dee815df..f50695e2 100644 --- a/i18n/ru/vpn.md +++ b/i18n/ru/vpn.md @@ -1,11 +1,12 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" +meta_title: "Рекомендации и сравнение приватных VPN-сервисов, без спонсоров и рекламы - Privacy Guides" title: "VPN сервисы" icon: material/vpn description: Это лучшие VPN-сервисы для защиты вашей конфиденциальности и безопасности в Интернете. Найдите провайдера, который не будет шпионить за вами. +cover: vpn.png --- -If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: +Если вам нужна дополнительная **приватность** от своего провайдера, при подключении к публичным сетям Wi-Fi или во время скачивания торрентов, VPN может быть правильным решением для вас, если вы понимаете связанные с этим риски. Мы считаем, что эти VPN-провайдеры на голову выше остальных:
@@ -23,13 +24,13 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne Если вам нужна дополнительная **безопасность**, убедитесь, что вы подключаетесь к веб-сайтам, используя [HTTPS](https://en.wikipedia.org/wiki/HTTPS). VPN не является заменой полезных привычек для обеспечения безопасности. - [Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } + [Установить Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Мифы Tor & FAQ](advanced/tor-overview.md){ .md-button } -[Detailed VPN Overview :material-arrow-right-drop-circle:](basics/vpn-overview.md ""){.md-button} +[Подробный обзор VPN :material-arrow-right-drop-circle:](basics/vpn-overview.md ""){.md-button} ## Рекомендованные провайдеры -Рекомендуемые нами провайдеры находятся за пределами США, используют шифрование, принимают Monero, поддерживают WireGuard и OpenVPN и не сохраняют логи вашего трафика. Read our [full list of criteria](#criteria) for more information. +Рекомендуемые нами провайдеры находятся за пределами США, используют шифрование, принимают Monero, поддерживают WireGuard и OpenVPN и не сохраняют логи вашего трафика. Для получения дополнительной информации, ознакомьтесь с [полным списком критериев](#criteria). ### IVPN @@ -47,12 +48,12 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne - [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) - [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) -#### :material-check:{ .pg-green } 35 Countries +#### :material-check:{ .pg-green } 35 стран -IVPN has [servers in 35 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Это происходит из-за более короткого маршрута (меньше промежуточных серверов) до пункта назначения. +У IVPN [серверы в 35 странах](https://www.ivpn.net/server-locations).(1) Выбор VPN с ближайшим к вам сервером позволит снизить задержку передаваемого вами трафика. Это происходит из-за более короткого маршрута (меньше промежуточных серверов) до пункта назначения. { .annotate } -1. Last checked: 2022-09-16 +1. Последняя проверка: 2022-09-16 We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server). @@ -182,7 +183,7 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad Proton VPN has [servers in 67 countries](https://protonvpn.com/vpn-servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Это происходит из-за более короткого маршрута (меньше промежуточных серверов) до пункта назначения. { .annotate } -1. Last checked: 2022-09-16 +1. Последняя проверка: 2022-09-16 We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server). diff --git a/i18n/sv/android.md b/i18n/sv/android.md index 9852869c..682465a6 100644 --- a/i18n/sv/android.md +++ b/i18n/sv/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/sv/calendar.md b/i18n/sv/calendar.md index da7f6ca7..a01b6b72 100644 --- a/i18n/sv/calendar.md +++ b/i18n/sv/calendar.md @@ -2,6 +2,7 @@ title: "Kalendersynkronisering" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md index 6a029133..15203ef4 100644 --- a/i18n/sv/cloud.md +++ b/i18n/sv/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Molnlagring" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Många molnlagringsleverantörer kräver ditt fulla förtroende för att de inte kommer att titta på dina filer. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/sv/cryptocurrency.md b/i18n/sv/cryptocurrency.md index 6d219099..7e699172 100644 --- a/i18n/sv/cryptocurrency.md +++ b/i18n/sv/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/sv/data-redaction.md b/i18n/sv/data-redaction.md index 0247b266..bc64f5fd 100644 --- a/i18n/sv/data-redaction.md +++ b/i18n/sv/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Redigering av data och metadata" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- När du delar filer ska du se till att ta bort tillhörande metadata. Bildfiler innehåller vanligtvis [Exif](https://en.wikipedia.org/wiki/Exif) data. Foton innehåller ibland även GPS-koordinater i filmetadata. diff --git a/i18n/sv/desktop-browsers.md b/i18n/sv/desktop-browsers.md index ac0fe6e1..0bcd12b5 100644 --- a/i18n/sv/desktop-browsers.md +++ b/i18n/sv/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/sv/desktop.md b/i18n/sv/desktop.md index 265ab503..bd43f668 100644 --- a/i18n/sv/desktop.md +++ b/i18n/sv/desktop.md @@ -2,6 +2,7 @@ title: "Skrivbord" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/sv/dns.md b/i18n/sv/dns.md index 01ba9e71..dda4525e 100644 --- a/i18n/sv/dns.md +++ b/i18n/sv/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/sv/email-clients.md b/i18n/sv/email-clients.md index cae032da..6bd3bdfe 100644 --- a/i18n/sv/email-clients.md +++ b/i18n/sv/email-clients.md @@ -2,6 +2,7 @@ title: "E-postklienter" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/sv/email.md b/i18n/sv/email.md index 8916221d..50ec7cee 100644 --- a/i18n/sv/email.md +++ b/i18n/sv/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/sv/encryption.md b/i18n/sv/encryption.md index 31344af3..77a2f0d2 100644 --- a/i18n/sv/encryption.md +++ b/i18n/sv/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Programvara för kryptering" icon: material/file-lock description: Kryptering av data är det enda sättet att kontrollera vem som har tillgång till dem. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Kryptering av data är det enda sättet att kontrollera vem som har tillgång till dem. Om du för närvarande inte använder krypteringsprogram för din hårddisk, e-post eller filer bör du välja ett alternativ här. diff --git a/i18n/sv/file-sharing.md b/i18n/sv/file-sharing.md index 34218aa3..99a98e1a 100644 --- a/i18n/sv/file-sharing.md +++ b/i18n/sv/file-sharing.md @@ -2,6 +2,7 @@ title: "Fildelning och synkronisering" icon: material/share-variant description: Upptäck hur du kan dela dina filer privat mellan dina enheter, med vänner och familj eller anonymt på nätet. +cover: file-sharing.png --- Upptäck hur du kan dela dina filer privat mellan dina enheter, med vänner och familj eller anonymt på nätet. diff --git a/i18n/sv/financial-services.md b/i18n/sv/financial-services.md index bbf55e49..db75a92a 100644 --- a/i18n/sv/financial-services.md +++ b/i18n/sv/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/sv/frontends.md b/i18n/sv/frontends.md index 1360ec03..4bb6f2c2 100644 --- a/i18n/sv/frontends.md +++ b/i18n/sv/frontends.md @@ -2,6 +2,7 @@ title: "Frontend" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/sv/mobile-browsers.md b/i18n/sv/mobile-browsers.md index a90a1b9a..c1b886ee 100644 --- a/i18n/sv/mobile-browsers.md +++ b/i18n/sv/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobila webbläsare" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/sv/multi-factor-authentication.md b/i18n/sv/multi-factor-authentication.md index af2ddffc..e13abc97 100644 --- a/i18n/sv/multi-factor-authentication.md +++ b/i18n/sv/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/sv/news-aggregators.md b/i18n/sv/news-aggregators.md index 8e30a214..46e8115e 100644 --- a/i18n/sv/news-aggregators.md +++ b/i18n/sv/news-aggregators.md @@ -2,6 +2,7 @@ title: "Nyhetsaggregatorer" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/sv/notebooks.md b/i18n/sv/notebooks.md index cb2b5900..2e695504 100644 --- a/i18n/sv/notebooks.md +++ b/i18n/sv/notebooks.md @@ -2,6 +2,7 @@ title: "Anteckningsböcker" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Håll koll på dina anteckningar och dagboksanteckningar utan att ge dem till tredje part. diff --git a/i18n/sv/passwords.md b/i18n/sv/passwords.md index dffd5718..4456cee5 100644 --- a/i18n/sv/passwords.md +++ b/i18n/sv/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Lösenordshanterare" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/sv/productivity.md b/i18n/sv/productivity.md index b5af915e..389381ac 100644 --- a/i18n/sv/productivity.md +++ b/i18n/sv/productivity.md @@ -2,6 +2,7 @@ title: "Produktivitetsverktyg" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md index 34047230..622c8921 100644 --- a/i18n/sv/real-time-communication.md +++ b/i18n/sv/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Realtidskommunikation" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/sv/router.md b/i18n/sv/router.md index ac86ded6..73d37b56 100644 --- a/i18n/sv/router.md +++ b/i18n/sv/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Nedan följer några alternativa operativsystem som kan användas på routrar, Wi-Fi-accesspunkter osv. diff --git a/i18n/sv/search-engines.md b/i18n/sv/search-engines.md index 5fb0d85b..51ff2523 100644 --- a/i18n/sv/search-engines.md +++ b/i18n/sv/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Sökmotorer" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/sv/tor.md b/i18n/sv/tor.md index 1a211ad2..4f078c99 100644 --- a/i18n/sv/tor.md +++ b/i18n/sv/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor-nätverket" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/sv/video-streaming.md b/i18n/sv/video-streaming.md index 9e53efdf..d74f02eb 100644 --- a/i18n/sv/video-streaming.md +++ b/i18n/sv/video-streaming.md @@ -2,6 +2,7 @@ title: "Videouppspelning" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- Det främsta hotet när du använder en plattform för videostreaming är att dina streamingvanor och prenumerationslistor kan användas för att profilera dig. Du bör kombinera dessa verktyg med en [VPN](vpn.md) eller [Tor](https://www.torproject.org/) för att göra det svårare att profilera din användning. diff --git a/i18n/sv/vpn.md b/i18n/sv/vpn.md index 12ba50f8..d4035dca 100644 --- a/i18n/sv/vpn.md +++ b/i18n/sv/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/tr/android.md b/i18n/tr/android.md index be480b23..14851e6d 100644 --- a/i18n/tr/android.md +++ b/i18n/tr/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/tr/calendar.md b/i18n/tr/calendar.md index 24929326..394b11aa 100644 --- a/i18n/tr/calendar.md +++ b/i18n/tr/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md index 922ea85a..9600de5a 100644 --- a/i18n/tr/cloud.md +++ b/i18n/tr/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/tr/cryptocurrency.md b/i18n/tr/cryptocurrency.md index 5ccba828..6cbffceb 100644 --- a/i18n/tr/cryptocurrency.md +++ b/i18n/tr/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/tr/data-redaction.md b/i18n/tr/data-redaction.md index 793cc206..f52314e3 100644 --- a/i18n/tr/data-redaction.md +++ b/i18n/tr/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/tr/desktop-browsers.md b/i18n/tr/desktop-browsers.md index 4796ac21..71dbf39e 100644 --- a/i18n/tr/desktop-browsers.md +++ b/i18n/tr/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Masaüstü Tarayıcıları" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/tr/desktop.md b/i18n/tr/desktop.md index 79666c71..e71b90a7 100644 --- a/i18n/tr/desktop.md +++ b/i18n/tr/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/tr/dns.md b/i18n/tr/dns.md index 318dc5cb..671f13ba 100644 --- a/i18n/tr/dns.md +++ b/i18n/tr/dns.md @@ -2,6 +2,7 @@ title: "DNS Çözümleyicileri" icon: material/dns description: Bunlar, İSS'nizin varsayılan yapılandırmasını değiştirmek için geçiş yapmanızı önerdiğimiz bazı şifreli DNS sağlayıcılarıdır. +cover: dns.png --- Üçüncü taraf sunucularla şifrelenmiş DNS, yalnızca herhangi bir sonucu olmayacağından emin olduğunuzda temel [DNS Engellemesini](https://en.wikipedia.org/wiki/DNS_blocking) aşmak için kullanılmalıdır. Şifrelenmiş DNS internet faaliyetlerinizi gizlemenize yardımcı olmaz. diff --git a/i18n/tr/email-clients.md b/i18n/tr/email-clients.md index 18831df4..9f6061cf 100644 --- a/i18n/tr/email-clients.md +++ b/i18n/tr/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/tr/email.md b/i18n/tr/email.md index 835cd3ad..2ab3e7f0 100644 --- a/i18n/tr/email.md +++ b/i18n/tr/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/tr/encryption.md b/i18n/tr/encryption.md index 1c9eb7c3..dd255a86 100644 --- a/i18n/tr/encryption.md +++ b/i18n/tr/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/tr/file-sharing.md b/i18n/tr/file-sharing.md index 90cd02f9..95ffe63c 100644 --- a/i18n/tr/file-sharing.md +++ b/i18n/tr/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/tr/financial-services.md b/i18n/tr/financial-services.md index eb76f042..6797e7e0 100644 --- a/i18n/tr/financial-services.md +++ b/i18n/tr/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/tr/frontends.md b/i18n/tr/frontends.md index c042e98e..bf7a1281 100644 --- a/i18n/tr/frontends.md +++ b/i18n/tr/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/tr/mobile-browsers.md b/i18n/tr/mobile-browsers.md index f5a5d261..1f5e4e40 100644 --- a/i18n/tr/mobile-browsers.md +++ b/i18n/tr/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/tr/multi-factor-authentication.md b/i18n/tr/multi-factor-authentication.md index 7e217b39..6930bd94 100644 --- a/i18n/tr/multi-factor-authentication.md +++ b/i18n/tr/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/tr/news-aggregators.md b/i18n/tr/news-aggregators.md index ad937431..8bcaad7a 100644 --- a/i18n/tr/news-aggregators.md +++ b/i18n/tr/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/tr/notebooks.md b/i18n/tr/notebooks.md index 14af2848..8486b6ba 100644 --- a/i18n/tr/notebooks.md +++ b/i18n/tr/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/tr/passwords.md b/i18n/tr/passwords.md index e5423ffc..e0a00497 100644 --- a/i18n/tr/passwords.md +++ b/i18n/tr/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/tr/productivity.md b/i18n/tr/productivity.md index 85315429..0becf041 100644 --- a/i18n/tr/productivity.md +++ b/i18n/tr/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/tr/real-time-communication.md b/i18n/tr/real-time-communication.md index 5bc4ad3b..e5aa9411 100644 --- a/i18n/tr/real-time-communication.md +++ b/i18n/tr/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Gerçek Zamanlı İletişim" icon: material/chat-processing description: Diğer anlık mesajlaşma uygulamaları, tüm özel konuşmalarınızı kendilerini işleten şirketin kullanımına sunuyor. +cover: real-time-communication.png --- Bunlar, şifrelenmiş gerçek zamanlı iletişim için önerilerimizdir. diff --git a/i18n/tr/router.md b/i18n/tr/router.md index 9212dc02..97be0a33 100644 --- a/i18n/tr/router.md +++ b/i18n/tr/router.md @@ -2,6 +2,7 @@ title: "Yönlendirici Yazılımı" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Aşağıda; yönlendiricilerde, Wi-Fi erişim noktalarında vb. kullanılabilecek birkaç alternatif işletim sistemi bulunmaktadır. diff --git a/i18n/tr/search-engines.md b/i18n/tr/search-engines.md index 04e6d06f..082f873e 100644 --- a/i18n/tr/search-engines.md +++ b/i18n/tr/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/tr/tor.md b/i18n/tr/tor.md index ee02c2cf..0edef82f 100644 --- a/i18n/tr/tor.md +++ b/i18n/tr/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/tr/video-streaming.md b/i18n/tr/video-streaming.md index 47795ce2..6a2542ad 100644 --- a/i18n/tr/video-streaming.md +++ b/i18n/tr/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/tr/vpn.md b/i18n/tr/vpn.md index 33b2b24e..b8850c0b 100644 --- a/i18n/tr/vpn.md +++ b/i18n/tr/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/uk/android.md b/i18n/uk/android.md index 702b1962..4f4d8b3b 100644 --- a/i18n/uk/android.md +++ b/i18n/uk/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/uk/calendar.md b/i18n/uk/calendar.md index 93b2b93d..e3af2a32 100644 --- a/i18n/uk/calendar.md +++ b/i18n/uk/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md index a1fa59cb..47f17891 100644 --- a/i18n/uk/cloud.md +++ b/i18n/uk/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/uk/cryptocurrency.md b/i18n/uk/cryptocurrency.md index 513f385b..817961a9 100644 --- a/i18n/uk/cryptocurrency.md +++ b/i18n/uk/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/uk/data-redaction.md b/i18n/uk/data-redaction.md index eeabfaac..46d778ba 100644 --- a/i18n/uk/data-redaction.md +++ b/i18n/uk/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/uk/desktop-browsers.md b/i18n/uk/desktop-browsers.md index 73dccf68..6b2209b7 100644 --- a/i18n/uk/desktop-browsers.md +++ b/i18n/uk/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/uk/desktop.md b/i18n/uk/desktop.md index 591949fb..c39d8a81 100644 --- a/i18n/uk/desktop.md +++ b/i18n/uk/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/uk/dns.md b/i18n/uk/dns.md index 7ddc3594..cba08b57 100644 --- a/i18n/uk/dns.md +++ b/i18n/uk/dns.md @@ -2,6 +2,7 @@ title: "Розв'язувачі DNS" icon: material/dns description: Ось кілька провайдерів зашифрованих DNS, на яких ми рекомендуємо перейти, щоб замінити конфігурацію за замовчуванням вашого Інтернет-провайдера. +cover: dns.png --- Зашифрований DNS на сторонніх серверах слід використовувати, щоб обійти базове [блокування за DNS](https://en.wikipedia.org/wiki/DNS_blocking) лише тоді, коли ви впевнені, що це не матиме жодних наслідків. Зашифрований DNS не допоможе вам приховати будь-яку вашу веб-активність. diff --git a/i18n/uk/email-clients.md b/i18n/uk/email-clients.md index 108dbb64..f36ce3f3 100644 --- a/i18n/uk/email-clients.md +++ b/i18n/uk/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/uk/email.md b/i18n/uk/email.md index c509ef89..08ced432 100644 --- a/i18n/uk/email.md +++ b/i18n/uk/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Сервіси електронної пошти" icon: material/email description: Ці провайдери електронної пошти пропонують чудове місце для безпечного зберігання ваших листів, а багато з них пропонують сумісне з іншими провайдерами шифрування OpenPGP. +cover: email.png --- Електронна пошта це практично необхідність для користування будь-яким онлайн-сервісом, проте ми не рекомендуємо використовувати її для особистих розмов. Замість того, щоб використовувати електронну пошту для зв'язку з іншими людьми, розгляньте можливість використання засобів обміну повідомленнями, які підтримують таємницю. diff --git a/i18n/uk/encryption.md b/i18n/uk/encryption.md index 86ba5da1..5f12ecdd 100644 --- a/i18n/uk/encryption.md +++ b/i18n/uk/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/uk/file-sharing.md b/i18n/uk/file-sharing.md index d19f5379..2fc7d89e 100644 --- a/i18n/uk/file-sharing.md +++ b/i18n/uk/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/uk/financial-services.md b/i18n/uk/financial-services.md index a22bf6a7..b7df5586 100644 --- a/i18n/uk/financial-services.md +++ b/i18n/uk/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/uk/frontends.md b/i18n/uk/frontends.md index fcf38c89..6f82f473 100644 --- a/i18n/uk/frontends.md +++ b/i18n/uk/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/uk/mobile-browsers.md b/i18n/uk/mobile-browsers.md index 91e215d4..10af9166 100644 --- a/i18n/uk/mobile-browsers.md +++ b/i18n/uk/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/uk/multi-factor-authentication.md b/i18n/uk/multi-factor-authentication.md index d39b2535..60d379b7 100644 --- a/i18n/uk/multi-factor-authentication.md +++ b/i18n/uk/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/uk/news-aggregators.md b/i18n/uk/news-aggregators.md index fcb6cd9e..76788ce2 100644 --- a/i18n/uk/news-aggregators.md +++ b/i18n/uk/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/uk/notebooks.md b/i18n/uk/notebooks.md index 0dc79474..466a3ea8 100644 --- a/i18n/uk/notebooks.md +++ b/i18n/uk/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/uk/passwords.md b/i18n/uk/passwords.md index a00dd27f..3b7dad29 100644 --- a/i18n/uk/passwords.md +++ b/i18n/uk/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/uk/productivity.md b/i18n/uk/productivity.md index 76406e03..d6a63a49 100644 --- a/i18n/uk/productivity.md +++ b/i18n/uk/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/uk/real-time-communication.md b/i18n/uk/real-time-communication.md index 8a807e54..dd452e0c 100644 --- a/i18n/uk/real-time-communication.md +++ b/i18n/uk/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/uk/router.md b/i18n/uk/router.md index 8a63b1af..8802ebdf 100644 --- a/i18n/uk/router.md +++ b/i18n/uk/router.md @@ -2,6 +2,7 @@ title: "Прошивка роутера" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Нижче наведено кілька альтернативних операційних систем, які можна використовувати на маршрутизаторах, точках доступу Wi-Fi тощо. diff --git a/i18n/uk/search-engines.md b/i18n/uk/search-engines.md index 8fe3eac3..9e23fb78 100644 --- a/i18n/uk/search-engines.md +++ b/i18n/uk/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/uk/tor.md b/i18n/uk/tor.md index 838ccbd2..26ba5f30 100644 --- a/i18n/uk/tor.md +++ b/i18n/uk/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/uk/video-streaming.md b/i18n/uk/video-streaming.md index a6654d12..d8d7245c 100644 --- a/i18n/uk/video-streaming.md +++ b/i18n/uk/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/uk/vpn.md b/i18n/uk/vpn.md index a70ab154..f87f7955 100644 --- a/i18n/uk/vpn.md +++ b/i18n/uk/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/vi/android.md b/i18n/vi/android.md index 463cd30c..ef4e2a19 100644 --- a/i18n/vi/android.md +++ b/i18n/vi/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'fontawesome/brands/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/vi/calendar.md b/i18n/vi/calendar.md index 86494966..e6960952 100644 --- a/i18n/vi/calendar.md +++ b/i18n/vi/calendar.md @@ -2,6 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md index 72625238..17e70712 100644 --- a/i18n/vi/cloud.md +++ b/i18n/vi/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/vi/cryptocurrency.md b/i18n/vi/cryptocurrency.md index 67264f4c..6f9dad5f 100644 --- a/i18n/vi/cryptocurrency.md +++ b/i18n/vi/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/vi/data-redaction.md b/i18n/vi/data-redaction.md index e3a76ca2..1de61fb9 100644 --- a/i18n/vi/data-redaction.md +++ b/i18n/vi/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/vi/desktop-browsers.md b/i18n/vi/desktop-browsers.md index 33107bab..be83baad 100644 --- a/i18n/vi/desktop-browsers.md +++ b/i18n/vi/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/vi/desktop.md b/i18n/vi/desktop.md index 76917148..da867b52 100644 --- a/i18n/vi/desktop.md +++ b/i18n/vi/desktop.md @@ -2,6 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. +cover: desktop.png --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/vi/dns.md b/i18n/vi/dns.md index dc45da28..67fca82d 100644 --- a/i18n/vi/dns.md +++ b/i18n/vi/dns.md @@ -2,6 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/vi/email-clients.md b/i18n/vi/email-clients.md index 6684003d..f49837ef 100644 --- a/i18n/vi/email-clients.md +++ b/i18n/vi/email-clients.md @@ -2,6 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/vi/email.md b/i18n/vi/email.md index b5dd082c..ffb0d6a1 100644 --- a/i18n/vi/email.md +++ b/i18n/vi/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/vi/encryption.md b/i18n/vi/encryption.md index 0b90186f..81dd8f25 100644 --- a/i18n/vi/encryption.md +++ b/i18n/vi/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/vi/file-sharing.md b/i18n/vi/file-sharing.md index a95bb817..8d841a82 100644 --- a/i18n/vi/file-sharing.md +++ b/i18n/vi/file-sharing.md @@ -2,6 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/vi/financial-services.md b/i18n/vi/financial-services.md index 7ebb0942..4e7b3519 100644 --- a/i18n/vi/financial-services.md +++ b/i18n/vi/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/vi/frontends.md b/i18n/vi/frontends.md index 8ea9514e..48df2eb7 100644 --- a/i18n/vi/frontends.md +++ b/i18n/vi/frontends.md @@ -2,6 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/vi/mobile-browsers.md b/i18n/vi/mobile-browsers.md index 4ac900e6..c6704c1f 100644 --- a/i18n/vi/mobile-browsers.md +++ b/i18n/vi/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/vi/multi-factor-authentication.md b/i18n/vi/multi-factor-authentication.md index e51dfb59..a768b5a7 100644 --- a/i18n/vi/multi-factor-authentication.md +++ b/i18n/vi/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## Hardware Security Keys diff --git a/i18n/vi/news-aggregators.md b/i18n/vi/news-aggregators.md index 18d1409b..dc592b55 100644 --- a/i18n/vi/news-aggregators.md +++ b/i18n/vi/news-aggregators.md @@ -2,6 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/vi/notebooks.md b/i18n/vi/notebooks.md index d44f5e00..0d8a547a 100644 --- a/i18n/vi/notebooks.md +++ b/i18n/vi/notebooks.md @@ -2,6 +2,7 @@ title: "Sổ Ghi Chép" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Theo dõi các ghi chú và nhật ký của bạn mà không đưa chúng cho bên thứ ba. diff --git a/i18n/vi/passwords.md b/i18n/vi/passwords.md index 1c79562f..f077b87f 100644 --- a/i18n/vi/passwords.md +++ b/i18n/vi/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/vi/productivity.md b/i18n/vi/productivity.md index 67e6f6cd..c932e813 100644 --- a/i18n/vi/productivity.md +++ b/i18n/vi/productivity.md @@ -2,6 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/vi/real-time-communication.md b/i18n/vi/real-time-communication.md index aca22eda..0b0c363b 100644 --- a/i18n/vi/real-time-communication.md +++ b/i18n/vi/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/vi/router.md b/i18n/vi/router.md index abdf4003..ba90b19b 100644 --- a/i18n/vi/router.md +++ b/i18n/vi/router.md @@ -2,6 +2,7 @@ title: "Firmware Bộ định tuyến" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Dưới đây là một số hệ điều hành thay thế, có thể được sử dụng trên bộ định tuyến, điểm truy cập Wi-Fi, v.v. diff --git a/i18n/vi/search-engines.md b/i18n/vi/search-engines.md index 65c38f2c..22508142 100644 --- a/i18n/vi/search-engines.md +++ b/i18n/vi/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/vi/tor.md b/i18n/vi/tor.md index 33c30c8e..6b64ff5f 100644 --- a/i18n/vi/tor.md +++ b/i18n/vi/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/vi/video-streaming.md b/i18n/vi/video-streaming.md index 6787f9a7..4fdb6e13 100644 --- a/i18n/vi/video-streaming.md +++ b/i18n/vi/video-streaming.md @@ -2,6 +2,7 @@ title: "Video Streaming" icon: material/video-wireless description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage. diff --git a/i18n/vi/vpn.md b/i18n/vi/vpn.md index e0ee3883..a5a0bf71 100644 --- a/i18n/vi/vpn.md +++ b/i18n/vi/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/zh-Hant/android.md b/i18n/zh-Hant/android.md index b96629b4..3e4de0ae 100644 --- a/i18n/zh-Hant/android.md +++ b/i18n/zh-Hant/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "安卓" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/calendar.md b/i18n/zh-Hant/calendar.md index a131926f..6867a693 100644 --- a/i18n/zh-Hant/calendar.md +++ b/i18n/zh-Hant/calendar.md @@ -2,6 +2,7 @@ title: "行事曆同步" icon: material/calendar description: 行事曆包含一些您最敏感的資料,使用實現靜態加密的產品。 +cover: calendar.png --- 行事曆包含一些您最敏感的資料;請使用未存取時執行 E2EE 的產品,以防止供應商讀取這些資料。 diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md index 5305e1ab..7bba11f6 100644 --- a/i18n/zh-Hant/cloud.md +++ b/i18n/zh-Hant/cloud.md @@ -3,6 +3,7 @@ meta_title: "最佳私有和安全的雲端儲存服務提供商 - Privacy Guide title: "雲端儲存" icon: material/file-cloud description: 許多雲端儲存服務供應商需要您相信他們不會查看您的檔案。 這些都是私密替代品! +cover: cloud.png --- 許多雲端儲存服務供應商需要您完全信任他們不會查看您的檔案。 下面列出的替代方案通過實施安全的 E2EE,消除了對信任的需要。 diff --git a/i18n/zh-Hant/cryptocurrency.md b/i18n/zh-Hant/cryptocurrency.md index c09f0f49..b1a85d88 100644 --- a/i18n/zh-Hant/cryptocurrency.md +++ b/i18n/zh-Hant/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "私密加密貨幣區塊錬 - Privacy Guides" title: 加密貨幣 icon: material/bank-circle +cover: cryptocurrency.png --- 線上支付是隱私面臨的最大挑戰之一。 下列加密貨幣預設提供交易隱私(大多數加密貨幣**並未保證**如此 ),前提是您對如何有效地進行私人支付有深入了解。 我們強烈建議您在網路購買前先閱讀本站私密付款之介紹: diff --git a/i18n/zh-Hant/data-redaction.md b/i18n/zh-Hant/data-redaction.md index ad659e3b..7b934a3d 100644 --- a/i18n/zh-Hant/data-redaction.md +++ b/i18n/zh-Hant/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "使用中繼資料洗滌器和數據編輯工具移除個人識別 title: "資料和中繼資料處理" icon: material/tag-remove description: 使用這些工具來移除所分享的相片和文件中的GPS定位和其他識別資訊等中繼資料。 +cover: data-redaction.png --- 分享檔案時,請務必移除相關的中繼資料。 映像文件通常包含 [Exif](https://en.wikipedia.org/wiki/Exif) 數據。 照片有時甚至在文件元數據中包含GPS坐標。 diff --git a/i18n/zh-Hant/desktop-browsers.md b/i18n/zh-Hant/desktop-browsers.md index b6b0b713..259702d7 100644 --- a/i18n/zh-Hant/desktop-browsers.md +++ b/i18n/zh-Hant/desktop-browsers.md @@ -1,13 +1,14 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" -title: "Desktop Browsers" +meta_title: "PC 和 Mac上隱私權尊重網頁瀏覽器的 - Privacy Guides" +title: "桌面瀏覽器" icon: material/laptop -description: These web browsers provide stronger privacy protections than Google Chrome. +description: 這些網頁瀏覽器提供比 Google Chrome 更強大的隱私保護。 +cover: desktop-browsers.png schema: - "@context": http://schema.org "@type": WebPage - name: Private Desktop Browser Recommendations + name: 私人桌面瀏覽器建議 url: "./" relatedLink: "../mobile-browsers/" - @@ -56,58 +57,58 @@ schema: url: "./" --- -These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility. +這些是我們目前推薦的桌面網頁瀏覽器和標準/非匿名瀏覽的配置。 如果在意強大的隱私保護和優異的防止辨識指紋,建議使用 [Mullvad 瀏覽器](#mullvad-browser) , [Firefox](#firefox) 適合作替代 Google Chrome 的休閒網際網路瀏覽器,而 [Brave](#brave)則適合需要Chromium 瀏覽器兼容性。 -如果你需要匿名瀏覽網際網路,你應該使用 [Tor](tor.md) 代替。 We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another. +如果你需要匿名瀏覽網際網路,你應該使用 [Tor](tor.md) 代替。 我們在這裏提出一些設定建議,除 Tor 瀏覽器之外所有瀏覽器都會被 *某人* 以某種方式追蹤。 ## Mullvad Browser !!! recommendation - ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ align=right } + ! [Mullvad Browser logo] (assets/img/browsers/mullvad_browser.svg) {align = right} - **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. + * * Mullvad 瀏覽器* *是移除 Tor 網路整合的[Tor 瀏覽器] (tor.md#tor-browser)版本,旨在為 VPN 用戶提供Tor 瀏覽器的反指紋辨識瀏覽器技術。 它由 Tor Porject 開發並由 [Mullvad](vpn.md#mullvad)發佈,且不需要使用 Mullvad 的 VPN。 [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" } - ??? downloads + ??? 下載 - [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows) - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) - [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux) -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +與 [Tor 瀏覽器](tor.md)一樣, Mullvad 瀏覽器旨在把 Mullvad 瀏覽器用戶的識別指紋弄得一樣,來防止指紋識別,它還包含預設安全級別自動配置的設置和擴展: *標準*, *更安全* 和 *最安全*。 因此,除了調整預設的 [安全等級](https://tb-manual.torproject.org/security-settings/)之外,您絕對不要修改瀏覽器。 其他修改將使您的指紋獨一無二,破壞使用此瀏覽器的目的。 如果您想重度配置瀏覽器,並且指紋不是問題,則建議使用 [Firefox](#firefox) 。 -### Anti-Fingerprinting +### 防指印辨識 -**Without** using a [VPN](vpn.md), Mullvad Browser provides the same protections against [naive fingerprinting scripts](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) as other private browsers like Firefox+[Arkenfox](#arkenfox-advanced) or [Brave](#brave). Mullvad Browser provides these protections out of the box, at the expense of some flexibility and convenience that other private browsers can provide. +**沒有** 使用 [VPN](vpn.md), Mullvad 瀏覽器提供與其他私人瀏覽器(如Firefox +[Arkenfox](#arkenfox-advanced) 或 [Brave](#brave))相同的保護,防止 [原生的指紋腳本](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) 。 Mullvad Browser 優異地提供這些保護,代價是沒有其它瀏覽器所具備的靈活性和便利。 -==For the strongest anti-fingerprinting protection, we recommend using Mullvad Browser in conjunction **with** a VPN==, whether that is Mullvad or another recommended VPN provider. When using a VPN with Mullvad Browser, you will share a fingerprint and a pool of IP addresses with many other users, giving you a "crowd" to blend in with. This strategy is the only way to thwart advanced tracking scripts, and is the same anti-fingerprinting technique used by Tor Browser. +==需要最強的防指紋辨識保護,建議使用 Mullvad 瀏覽器**搭配** VPN==無論是 Mullvad VPN 或其它推薦的 VPN 提供商。 Mullvad 瀏覽器使用 VPN 時,您將與許多其他用戶共享指紋和 IP地址池,以讓您混在其中的“人羣”。 這種策略是阻止進階追蹤腳本的唯一方法,也是Tor Browser使用的相同反指紋技術。 -Note that while you can use Mullvad Browser with any VPN provider, other people on that VPN must also be using Mullvad Browser for this "crowd" to exist, something which is more likely on Mullvad VPN compared to other providers, particularly this close to the launch of Mullvad Browser. Mullvad Browser does not have built-in VPN connectivity, nor does it check whether you are using a VPN before browsing; your VPN connection has to be configured and managed separately. +請注意,雖然可以將 Mullvad 瀏覽器與任何 VPN 一起使用,但該 VPN 的其他人也必須使用 Mullvad瀏覽器 "人群"才會存在。比起其他提供商, Mullvad VPN 更可能存在相同的人群,特別是Mullvad 瀏覽器的推出。 Mullvad 瀏覽器沒有內建VPN 連接,也不會在瀏覽之前檢查是否使用 VPN,必須單獨配置和管理VPN 連接。 -Mullvad Browser comes with the *uBlock Origin* and *NoScript* browser extensions pre-installed. While we typically [don't recommend](#extensions) adding *additional* browser extensions, these extensions that come pre-installed with the browser should **not** be removed or configured outside their default values, because doing so would noticeably make your browser fingerprint distinct from other Mullvad Browser users. It also comes pre-installed with the Mullvad Browser Extension, which *can* be safely removed without impacting your browser fingerprint if you would like, but is also safe to keep even if you don't use Mullvad VPN. +Mullvad 瀏覽器附帶預先安裝的 *uBlock Origin* 和 *NoScript* 擴充功能。 我們尤其[不建議](#extensions) 增 *額外的/em> 瀏覽器擴充套件,有些擴充在瀏覽器安裝之前已存在**無法**移除或改變預設值,因為一旦隨意更動就會突顯出您的 Mullvad 瀏覽器與其它Mullvad 瀏覽器的差異。 它還預先安裝了 Mullvad 瀏覽器擴展套件,但也可將之*安全地移除 * ,並不會影響瀏覽器指紋,但即使不使用Mullvad VPN ,也可以安全地保留。

-### Private Browsing Mode +### 隱私瀏覽模式 -Mullvad Browser operates in permanent private browsing mode, meaning your history, cookies, and other site data will always be cleared every time the browser is closed. Your bookmarks, browser settings, and extension settings will still be preserved. +Mullvad 瀏覽器永久以隱私瀏覽模式運行,這意味著歷史記錄、Cookie 和其他網站資料在每次關閉瀏覽器時都會被清除。 但書籤、瀏覽器設定和擴充功能設定仍會保留。 -This is required to prevent advanced forms of tracking, but does come at the cost of convenience and some Firefox features, such as Multi-Account Containers. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise don't work properly in Mullvad Browser, and Mullvad Browser for general browsing. +這是為了防止進階形式的跟蹤,但確實犧牲了方便和某些Firefox功能(例如多帳戶容器)為代價。 請記住,您可以隨時使用多個瀏覽器,例如,您可以考慮將Firefox + Arkenfox用於一些您希望保持登錄或在Mullvad瀏覽器中無法正常工作的網站,以及用於一般瀏覽的Mullvad瀏覽器。 ### Mullvad Leta -Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-engines.md), but it also comes preinstalled with **Mullvad Leta**, a search engine which requires an active Mullvad VPN subscription to access. Mullvad Leta queries Google's paid search API directly (which is why it is limited to paying subscribers), however because of this limitation it is possible for Mullvad to correlate search queries and Mullvad VPN accounts. For this reason we discourage the use of Mullvad Leta, even though Mullvad collects very little information about their VPN subscribers. +Mullvad Browser 將DuckDuckGo 設置為預設的 [搜索引擎](search-engines.md),它也預先安裝了 **Mullvad Leta**,這是需要訂閱 Mullvad VPN 才能訪問的搜索引擎。 Mullvad Leta 直接查詢 Google的付費搜索API (這是為什麼僅限於付費用戶) ,但由於這種限制, Mullvad 可以將搜索查詢與 Mullvad VPN 帳戶作關聯。 因此,不鼓勵使用 Mullvad Leta ,即使 Mullvad 收集關於其VPN 用戶的資訊很少。 ## Firefox !!! recommendation - ![Firefox logo](assets/img/browsers/firefox.svg){ align=right } + ! [Firefox標誌] (assets/img/browsers/firefox.svg) {align = right} - **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). + * * Firefox * *提供強大的隱私設定,例如[Enhanced Tracking Protection] (https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop) ,可以幫助阻止各種[類型的追蹤] (https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks)。 [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } @@ -115,83 +116,83 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } [:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } - ??? downloads + ??? 下載 - [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) - [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) - [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox) -!!! warning - Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +!!! 警告 + Firefox 在 Mozilla 網站的下載中包含一個獨特的 [下載令牌](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) ,並使用 Firefox 的遙測來發送令牌。 此令牌**not** 不包含在 [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/)版本。 ### 建議配置 -These options can be found in :material-menu: → **Settings** +這些選項可以在 :material-menu: → **設置**中找到 -#### Search +#### 搜尋 -- [ ] Uncheck **Provide search suggestions** +- [ ] 取消勾選**提供搜尋建議** -Search suggestion features may not be available in your region. +搜尋建議功能可能無法在您所在的地區使用。 -Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider. +搜尋建議會將您在地址列中輸入的所有內容傳送至預設搜尋引擎,無論您是否實際提交搜尋。 禁用搜尋建議可讓您更精確地控制您傳送給搜尋引擎供應商的資料。 -#### Privacy & Security +#### 隱私 & 安全 -##### Enhanced Tracking Protection +##### 增強的追蹤保護 -- [x] Select **Strict** Enhanced Tracking Protection +- [x] Select **嚴格**加強型追蹤保護 -This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability. +通過封鎖社交媒體跟蹤器、指紋腳本(請注意,這並不能防止 *所有* 指紋的侵害)、加密挖礦器、跨站點跟蹤cookie和其他跟蹤內容來保護您。 ETP 可以防止許多常見威脅,但它不能阻止所有跟蹤途徑,因為它的設計對網站的可用性影響很小甚至沒有影響。 -##### Firefox Suggest (US only) +##### Firefox建議(僅限美國) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) 功能只限美國地區,其類似於搜尋建議。 我們建議停用此功能的原因與我們建議停用搜尋建議的原因相同。 如果您在 **地址欄** 標題下沒有看到這些選項,則表示您沒有新的體驗,可以忽略這些變更。 -- [ ] Uncheck **Suggestions from the web** -- [ ] Uncheck **Suggestions from sponsors** +- [ ] 取消勾選 **提供搜尋建議** +- []取消勾選 **贊助商的建議** -##### Sanitize on Close +##### 關閉時消毒 -If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...** +如果您想在特定網站保持登錄狀態,可允許 **Cookies 和網站資料中的例外情況** → **管理例外情況...** -- [x] Check **Delete cookies and site data when Firefox is closed** +- [x] 勾選 **關閉 Firefox 時清除 Cookie 與網站資料** -This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often. +這可以保護您免受持久性 Cookie 侵害,但不能保護您免受在任何一次瀏覽過程的 Cookie。 啟用此功能後,只需重新啟動 Firefox ,即可輕鬆清除您的瀏覽器 cookie。 您可以設定每個網站的例外情況,如果希望經常訪問的特定網站保持登錄。 ##### 遙測 -- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla** -- [ ] Uncheck **Allow Firefox to install and run studies** -- [ ] Uncheck **Allow Firefox to send backlogged crash reports on your behalf** +- [ ] 取消勾選 **允許 Firefox 傳送技術與互動資料給 Mozilla** +- [ ] 取消勾選k **允許 Firefox 安裝並進行研究/strong> +- [ ] 取消勾選 **允許 Firefox 以您的身分自動回報錯誤報告** -> Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. +> Firefox 會傳送有關 Firefox 版本和語言的資料;裝置作業系統和硬體配置;記憶體、有關崩潰和錯誤的基本資訊;更新、安全瀏覽和啟動等自動化程序的結果。 當 Firefox 將資料傳送給我們時,您的IP位址會作為伺服器記錄的一部分暫時收集。 -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +此外, Firefox帳戶服務會收集 [一些技術資料](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts)。 如果有使用 Firefox 帳戶,可選擇退出: -1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) -2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** +1. 在 accounts.firefox.com 開啟您的 [個人資料設定](https://accounts.firefox.com/settings#data-collection) +2. 取消勾選 **資料收集和使用** > **協助改善Firefox帳戶** -##### HTTPS-Only Mode +##### 純 HTTPS 模式 -- [x] Select **Enable HTTPS-Only Mode in all windows** +- [x] 選擇 **在所有視窗都開啟純 HTTPS 模式** -This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing. +這可以防止您無意中連接到純文字 HTTP 網站。 如今,沒有 HTTPS 的網站已很少見,因此這對日常瀏覽幾乎沒有影響。 -#### Sync +#### 同步 -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) 可以在不同設備之間 E2EE 地傳輸同步瀏覽資料(訪問記錄與書籤等)。 -### Arkenfox (advanced) +### Arkenfox (進階) -!!! tip "Use Mullvad Browser for advanced anti-fingerprinting" +!!! tip "使用Mullvad 瀏覽器進階防指紋辨識" - [Mullvad Browser](#mullvad-browser) provides the same anti-fingerprinting protections as Arkenfox out of the box, and does not require the use of Mullvad's VPN to benefit from these protections. Coupled with a VPN, Mullvad Browser can thwart more advanced tracking scripts which Arkenfox cannot. Arkenfox still has the advantage of being much more flexible, and allowing per-site exceptions for websites which you need to stay logged in to. + [Mullvad瀏覽器] (#mullvad-browser)提供與 Arkenfox 相同的防指紋保護,不需要使用 Mullvad VPN 就能獲得這些保護。 再加上VPN , Mullvad 瀏覽器可以阻擋 Arkenfox 無法處理的更先進追蹤腳本。 Arkenfox 仍具有更靈活的優勢,可以對需要繼續登錄的網站設置例外。 -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +[Arkenfox 專案](https://github.com/arkenfox/user.js) 為 Firefox 提供一套完整的考量選項。 如果您 [決定](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) 使用Arkenfox ,則 [有幾個選項](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) 在主觀上嚴格而且可能導致某些網站無法正常運作- [可以輕鬆更改](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) 以滿足需求。 **強列建議**仔細看過他們完整的[維基頁wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox還支持 [容器](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) 。 -Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. +Arkenfox的目標只是通過Canvas隨機化和Firefox內置的指紋阻力配置設置來阻止基本或天真的跟蹤腳本。 它並不打算讓您的瀏覽器與其他 Arkenfox 用戶的大量混在一起,那是 Mullvad 瀏覽器或 Tor瀏覽器的作法,也是阻止進階指紋跟蹤腳本的唯一方法。 請記住,您可以隨時使用多個瀏覽器,例如,您可以考慮將Firefox + Arkenfox 用於希望保持登錄或可以信任的幾個網站,而 Mullvad 瀏覽器則用於一般瀏覽。 ## Brave @@ -209,20 +210,20 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand [:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" } - ??? downloads annotate + ??? 下載 annotate - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) - [:simple-windows11: Windows](https://brave.com/download/) - [:simple-apple: macOS](https://brave.com/download/) - [:simple-linux: Linux](https://brave.com/linux/) (1) - 1. We advise against using the Flatpak version of Brave, as it replaces Chromium's sandbox with Flatpak's, which is less effective. Additionally, the package is not maintained by Brave Software, Inc. + 1. 我們建議不要使用 Flatpak 版本的Brave ,因為它將 Chromium沙盒替換為 Flatpak 沙盒,後者不太有效。 此外,該套件並非由Brave Software, Inc.維護。 ### 建議配置 -These options can be found in :material-menu: → **Settings**. +這些選項可以在 :material-menu: → **設定**中找到。 -#### Settings +#### 設定 ##### Shields @@ -235,8 +236,8 @@ Shields 可以選擇根據需要依各網站情況降級,但我們建議預設 - [x] Select **Prevent sites from fingerprinting me based on my language preferences** - [x] Select **Aggressive** under Trackers & ads blocking - ??? warning "Use default filter lists" - Brave allows you to select additional content filters within the internal `brave://adblock` page. 我們建議您不要使用此功能;請保留預設的篩選條件清單。 使用額外清單將使您在一般 Brave 用戶中被突顯出來,如果Brave有漏洞,並將惡意規則添加到您使用的清單中,也可能會增加攻擊面。 + ??? warning "使用預設過濾器列表" + Brave允許您在內部`brave://adblock`頁面中選擇其他內容過濾器。 我們建議您不要使用此功能;請保留預設的篩選條件清單。 使用額外清單將使您在一般 Brave 用戶中被突顯出來,如果Brave有漏洞,並將惡意規則添加到您使用的清單中,也可能會增加攻擊面。 - [x] (Optional) Select **Block Scripts** (1) - [x] Select **Strict, may break sites** under Block fingerprinting @@ -245,11 +246,11 @@ Shields 可以選擇根據需要依各網站情況降級,但我們建議預設 1. 此選項提供的功能類似uBlock Origin 進階 [封鎖模式](https://github.com/gorhill/uBlock/wiki/Blocking-mode) 或 [NoScript](https://noscript.net/) 擴展。 -##### Social media blocking +##### 社交媒體屏蔽 - [ ] Uncheck all social media components -##### Privacy and security +##### 隐私和安全
@@ -269,24 +270,24 @@ Shields 可以選擇根據需要依各網站情況降級,但我們建議預設
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. 如果需要 [強大的匿名性](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) ,請使用 [Tor瀏覽器](tor.md#tor-browser)。 -##### Extensions +##### 擴充套件 -Disable built-in extensions you do not use in **Extensions** +**Extensions**中關閉不使用的內建擴展套件 - [ ] Uncheck **Hangouts** - [ ] Uncheck **WebTorrent** ##### Web3 -Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled. +Brave Web3 功能可能會增加瀏覽器指紋和攻擊面。 除非有用到任何功能,否則應停用這些功能。 - [ ] Set **Default Ethereum Wallet** to **None** - [ ] Set **Default Solana Wallet** to **None** - [ ] Set **Method to resolve IPFS resources** to **Disabled -##### System +##### 系統
@@ -294,49 +295,49 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack
-1. This option is not present on all platforms. +1. 此功能並不適用於所有平臺。 -#### Sync +#### 同步 [Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) 允許您在不同設備上訪問瀏覽數據(歷史記錄,書籤等),而無需帳戶且有 E2EE保護。 -#### Brave Rewards and Wallet +#### 勇敢獎勵與錢包 -**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature. +** Brave 獎勵** 可讓您在 Brave 執行某些動作時獲得Basic Attention Token (BAT) 加密貨幣。 它依賴於來自特定數量的提供商的託管帳戶和KYC。 我們不建議 BAT 作為 [私有加密貨幣](cryptocurrency.md),也不建議使用 [保管錢包](advanced/payments.md#other-coins-bitcoin-ethereum-etc),因此不鼓勵使用此功能。 -**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well. +**Brave Wallet** 在您的電腦上進行本地操作,但不支援任何私人加密貨幣,因此不鼓勵使用此功能。 -## Additional Resources +## 其他資源 -In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality. +一般來說,我們建議您將擴充功能維持在最低限度:它們在瀏覽器中有特別訪問權限,需要您信任開發人員,它們也會讓瀏覽器 [特徵顯露出來](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), [弱化](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) 網站隔離。 但是,如果您重視內容封鎖功能, uBlock Origin可能會很有用。 ### uBlock Origin !!! recommendation - ![uBlock Origin logo](assets/img/browsers/ublock_origin.svg){ align=right } + ! [uBlock Origin標誌] (assets/img/browsers/ublock_origin.svg) {align = right} - **uBlock Origin** is a popular content blocker that could help you block ads, trackers, and fingerprinting scripts. + * * uBlock Origin * *是一個受歡迎的內容攔截程式,可以幫助您封鎖廣告、追蹤器和指紋腳本。 [:octicons-repo-16: Repository](https://github.com/gorhill/uBlock#readme){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/gorhill/uBlock/wiki/Privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/gorhill/uBlock/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Source Code" } - ??? downloads + ??? 下載 - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) -We suggest following the [developer's documentation](https://github.com/gorhill/uBlock/wiki/Blocking-mode) and picking one of the "modes". Additional filter lists can impact performance and [may increase attack surface](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css). +我們建議遵循 [開發人員的文檔](https://github.com/gorhill/uBlock/wiki/Blocking-mode) 並選擇其中一個“模式”。 額外的過濾器清單可能會影響效能,而 [增加攻擊面](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css)。 -##### Other lists +##### 其它列表 -These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) that you may want to consider adding: +以下是其他 [篩選條件清單](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) ,您可考慮新增: - [x] Check **Privacy** > **AdGuard URL Tracking Protection** -- Add [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) +- 添加 [真正正統的 URL 縮短工具](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) ## 標準 @@ -349,29 +350,29 @@ These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashb ### 最低合格要求 - 必須是開源軟體。 -- Supports automatic updates. -- Receives engine updates in 0-1 days from upstream release. -- Available on Linux, macOS, and Windows. +- 支援自動更新。 +- 從上遊版本開始在0-1天內接收引擎更新。 +- 適用於Linux、macOS和Windows。 - 為了使瀏覽器更尊重隱私權而作的任何變動都不應對用戶體驗產生負面影響。 -- Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^1] +- 預設情況下會封鎖第三方Cookie。 +- 支援 [狀態分割](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) 以減輕跨網站追蹤。[^1] ### 最佳案例 最佳案例標準代表了我們希望從這個類別的完美項目應具備的功能。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 -- Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). -- Supports Progressive Web Apps. - PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. -- Does not include add-on functionality (bloatware) that does not impact user privacy. -- Does not collect telemetry by default. -- Provides open-source sync server implementation. -- Defaults to a [private search engine](search-engines.md). +- 包括內置的內容攔截功能。 +- 支持cookie分割( à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers))。 +- 支援漸進式網絡應用程式(Progressive Web Apps), + PWA 可讓您安裝某些網站,就像是電腦上的原生應用程式一樣。 這可能比安裝 Electron 應用程式更有優勢,因為您可以受益於瀏覽器定期安全更新。 +- 不包括不影響用戶隱私的附加功能( bloatware)。 +- 預設情況下不收集遙測。 +- 提供開源同步伺服器實作。 +- 預設為 [私密搜尋引擎](search-engines.md)。 ### 擴展元件標準 - 不得複製內建瀏覽器或作業系統功能。 - 必須直接影響用戶隱私,即不得簡單地提供資訊。 -[^1]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^1]: Brave 執行詳見 [Brave 隱私更新:為隱私分割網絡狀態](https://brave.com/privacy-updates/14-partitioning-network-state/). diff --git a/i18n/zh-Hant/desktop.md b/i18n/zh-Hant/desktop.md index 1d658865..d3e15e86 100644 --- a/i18n/zh-Hant/desktop.md +++ b/i18n/zh-Hant/desktop.md @@ -2,6 +2,7 @@ title: "桌上型電腦" icon: simple/linux description: 因為隱私保護和軟體自由,通常建議用 Linux發行版。 +cover: desktop.png --- 基於隱私保護和軟體自由,通常建議用 Linux 發行版。 如果您還不曾用過 Linux ,以下是我們建議可試試的發行版,以及一些 Linux發行版的隱私和安全提升技巧。 diff --git a/i18n/zh-Hant/dns.md b/i18n/zh-Hant/dns.md index 58ae1a5d..66e9cf30 100644 --- a/i18n/zh-Hant/dns.md +++ b/i18n/zh-Hant/dns.md @@ -2,6 +2,7 @@ title: "DNS解析器" icon: material/dns description: 我們建議切換到這些加密 DNS 提供商,以取代您 ISP 所預設的配置。 +cover: dns.png --- 使用第三方伺服器的加密 DNS 只能避開基本的 [DNS 封鎖](https://en.wikipedia.org/wiki/DNS_blocking) ,當您確定不會有不良後果時。 加密的 DNS 無法為您隱藏瀏覽活動。 diff --git a/i18n/zh-Hant/email-clients.md b/i18n/zh-Hant/email-clients.md index a20994ca..4e55ecdf 100644 --- a/i18n/zh-Hant/email-clients.md +++ b/i18n/zh-Hant/email-clients.md @@ -2,6 +2,7 @@ title: "電子郵件客戶端程式" icon: material/email-open description: 這些電子郵件客戶端尊重隱私並支持OpenPGP電子郵件加密。 +cover: email-clients.png --- 我們的推薦清單包含支援 [OpenPGP](encryption.md#openpgp) 和如[Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth)強認證的電子郵件用戶端 。 OAuth允許您使用 [多因素驗證](basics/multi-factor-authentication.md) 並防止帳戶被盜。 diff --git a/i18n/zh-Hant/email.md b/i18n/zh-Hant/email.md index 8ca1fb19..ad03b143 100644 --- a/i18n/zh-Hant/email.md +++ b/i18n/zh-Hant/email.md @@ -3,6 +3,7 @@ meta_title: "加密私人電子郵件建議 - Privacy Guides" title: "電子郵件服務" icon: material/email description: 這些電子郵件提供商提供了一個好地方來安全地存儲您的電子郵件,也有不少能與其他供應商相互操作的 OpenPGP 加密。 +cover: email.png --- 電子郵件實際上是使用任何線上服務的必需品,但我們不建議把它應用於人與人之間的對話。 與其使用電子郵件聯繫他人,不如考慮使用支援前向保密的即時通訊媒介。 diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md index a3915a92..f6bfd5cd 100644 --- a/i18n/zh-Hant/encryption.md +++ b/i18n/zh-Hant/encryption.md @@ -3,6 +3,7 @@ meta_title: "推薦的加密軟件: VeraCryp, Cryptomat, PicoCrypt 和 OpenPGP title: "加密軟體" icon: material/file-lock description: 數據加密是控制誰可以訪問它的唯一方法。 這些工具允許您加密電子郵件和任何其他檔案。 +cover: encryption.png --- 數據加密是控制誰可以訪問它的唯一方法。 如果您目前沒有為您的硬盤,電子郵件或文件使用加密軟件,您應該在這裡選擇一個選項。 diff --git a/i18n/zh-Hant/file-sharing.md b/i18n/zh-Hant/file-sharing.md index 7039c6a4..44e6186e 100644 --- a/i18n/zh-Hant/file-sharing.md +++ b/i18n/zh-Hant/file-sharing.md @@ -2,6 +2,7 @@ title: "文件共享和同步" icon: material/share-variant description: 探索如何在不同裝置、與朋友和家人私下分享檔案,或匿名上線。 +cover: file-sharing.png --- 探索如何在裝置之間、與朋友和家人私下分享檔案,或匿名上線。 diff --git a/i18n/zh-Hant/financial-services.md b/i18n/zh-Hant/financial-services.md index 32856988..b5bfe075 100644 --- a/i18n/zh-Hant/financial-services.md +++ b/i18n/zh-Hant/financial-services.md @@ -1,6 +1,7 @@ --- title: 金融服務 icon: material/bank +cover: financial-services.png --- 在線支付是隱私面臨的最大挑戰之一。 這些服務可以幫助您保護隱私,免受商家和其他追蹤者的影響,前提是您對如何有效地進行私人付款有深入的了解。 我們強烈建議您在網路購買前先閱讀本站私密付款之介紹: diff --git a/i18n/zh-Hant/frontends.md b/i18n/zh-Hant/frontends.md index 87cf46df..d2914a56 100644 --- a/i18n/zh-Hant/frontends.md +++ b/i18n/zh-Hant/frontends.md @@ -2,6 +2,7 @@ title: "前端" icon: material/flip-to-front description: 這些用在各式網際網路服務的開源前端,可讓您訪問內容而無需 JavaScript 或其他干援。 +cover: frontends.png --- 有時,某些服務會以煩人的彈出窗口來封鎖訪問內容,強迫訪客須註冊帳戶。 如果不啓用JavaScript ,也可能會中斷。 這些前端可以讓您避開這些限制。 diff --git a/i18n/zh-Hant/mobile-browsers.md b/i18n/zh-Hant/mobile-browsers.md index 7cfdc7c6..76028b97 100644 --- a/i18n/zh-Hant/mobile-browsers.md +++ b/i18n/zh-Hant/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "行動瀏覽器" icon: material/cellphone-information description: 這些瀏覽器是我們目前推薦在手機使用的標準/非匿名互聯網瀏覽器。 +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/multi-factor-authentication.md b/i18n/zh-Hant/multi-factor-authentication.md index 3731330d..59130c14 100644 --- a/i18n/zh-Hant/multi-factor-authentication.md +++ b/i18n/zh-Hant/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "多重因素驗證" icon: 'material/two-factor-authentication' description: 這些工具可協助您透過多重身份驗證保護網路帳戶,而無需將您的祕密傳送給第三方。 +cover: multi-factor-authentication.png --- ## 安全金鑰硬體 diff --git a/i18n/zh-Hant/news-aggregators.md b/i18n/zh-Hant/news-aggregators.md index 150bfa52..8bb29a7d 100644 --- a/i18n/zh-Hant/news-aggregators.md +++ b/i18n/zh-Hant/news-aggregators.md @@ -2,6 +2,7 @@ title: "新聞聚合器" icon: material/rss description: 這些新聞聚合器客戶端可利使用 RSS 等網際網路標準來訂閱追蹤您最喜愛的部落格和新聞網站。 +cover: news-aggregators.png --- [新聞聚合器](https://en.wikipedia.org/wiki/News_aggregator) 是一種訂閱最喜愛的部落格和新聞網站的追蹤方式。 diff --git a/i18n/zh-Hant/notebooks.md b/i18n/zh-Hant/notebooks.md index c42432c0..b678d08d 100644 --- a/i18n/zh-Hant/notebooks.md +++ b/i18n/zh-Hant/notebooks.md @@ -2,6 +2,7 @@ title: "記事本" icon: material/notebook-edit-outline description: 這些加密的筆記錄應用程式可讓您跟進記錄,而無需將它們提供給第三方。 +cover: notebooks.png --- 保存記錄您的筆記和日誌,不要將它們提供給第三方。 diff --git a/i18n/zh-Hant/passwords.md b/i18n/zh-Hant/passwords.md index f4fbb118..c579409a 100644 --- a/i18n/zh-Hant/passwords.md +++ b/i18n/zh-Hant/passwords.md @@ -3,6 +3,7 @@ meta_title: "保護您的隱私和安全的最佳密碼管理器 - Privacy Guide title: "密碼管理器。" icon: material/form-textbox-password description: 密碼管理員允許您安全地存儲和管理密碼和其他憑證。 +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/productivity.md b/i18n/zh-Hant/productivity.md index daa818fe..8096496d 100644 --- a/i18n/zh-Hant/productivity.md +++ b/i18n/zh-Hant/productivity.md @@ -2,6 +2,7 @@ title: "工作效率工具" icon: material/file-sign description: 大多數線上辦公套件不支持 E2EE ,這意味著雲提供商可以存取您所做的一切。 +cover: productivity.png --- 大多數線上辦公套件不支持 E2EE ,這意味著雲提供商可以存取您所做的一切。 隱私權政策可在法律上保護您的權利,但不提供技術存取限制。 diff --git a/i18n/zh-Hant/real-time-communication.md b/i18n/zh-Hant/real-time-communication.md index 8d566c00..d435f53e 100644 --- a/i18n/zh-Hant/real-time-communication.md +++ b/i18n/zh-Hant/real-time-communication.md @@ -1,27 +1,28 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "最好的私人即時通訊軟體 - Privacy Guides" title: "即時通訊軟體" icon: material/chat-processing -description: Other instant messengers make all of your private conversations available to the company that runs them. +description: 其他即時通訊則會讓您所有的私人對話被該軟體公司取得。 +cover: real-time-communication.png --- -These are our recommendations for encrypted real-time communication. +這些是我們所推薦的加密實時通訊軟體。 -[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) +[通訊網絡 :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) -## Encrypted Messengers +## 加密傳訊軟體 -These messengers are great for securing your sensitive communications. +這些軟體非常適合保護您的敏感通訊。 ### Signal !!! recommendation - ![Signal logo](assets/img/messengers/signal.svg){ align=right } + ! [Signal logo] (assets/img/messengers/signal.svg) {align = right} - **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling. + * * Signal * *是由Signal Messenger LLC開發的行動應用程式。 該應用程式提供即時消息,以及語音和視頻通話。 - All communications are E2EE. Contact lists are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. + 所有通信都是E2EE。 連絡人清單會使用您的 Signal PIN 加密,而伺服器無法存取。 個人帳號也會加密,並僅與您聊天的聯絡人分享。 [:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } @@ -29,7 +30,7 @@ These messengers are great for securing your sensitive communications. [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } [:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } - ??? downloads + ??? 下載 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) @@ -38,46 +39,46 @@ These messengers are great for securing your sensitive communications. - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) -Signal supports [private groups](https://signal.org/blog/signal-private-group-system/). The server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. Signal requires your phone number as a personal identifier. +Signal支持 [私人羣組](https://signal.org/blog/signal-private-group-system/)。 伺服器不會記錄羣組成員資格、羣組標題、羣組頭像或羣組屬性。 當啓用 [Sealed Sender](https://signal.org/blog/sealed-sender/) 時, Signal具有最小元數據。 發件人地址與訊息內文一起加密,伺服器只可見到收件人地址。 Sealed Sender 功能僅適用於聯絡人清單的成員,但在收訊時也可啟用以防止接收垃圾郵件增加的風險。 Signal 需要您的電話號碼作為個人識別碼。 -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +其協議在2016年獨立進行了 [審計](https://eprint.iacr.org/2016/1013.pdf) 。 Signal 協議的規範可以在他們的 [文檔](https://signal.org/docs/)中找到。 -We have some additional tips on configuring and hardening your Signal installation: +我們有一些關於配置和硬化 Signal 安裝的額外提示: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal 配置和硬化 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) ### SimpleX Chat !!! recommendation - ![Simplex logo](assets/img/messengers/simplex.svg){ align=right } + ! [Simplex logo] (assets/img/messengers/simplex.svg) {align = right} - **SimpleX** Chat is an instant messenger that is decentralized and doesn't depend on any unique identifiers such as phone numbers or usernames. Users of SimpleX Chat can scan a QR code or click an invite link to participate in group conversations. + * * SimpleX * * Chat 是一個分散的即時通訊工具,不依賴任何獨有識別碼,如電話號碼或用戶名。 SimpleX Chat 使用者可以掃描二維碼或點擊邀請連結以參與羣組對話。 [:octicons-home-16: Homepage](https://simplex.chat){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/simplex-chat/simplex-chat/blob/stable/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/simplex-chat/simplex-chat/tree/stable/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Source Code" } - ??? downloads + ??? 下載 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) - [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) -SimpleX Chat [was audited](https://simplex.chat/blog/20221108-simplex-chat-v4.2-security-audit-new-website.html) by Trail of Bits in October 2022. +SimpleX Chat 於2022年10月接受 Trail of Bits [審計](https://simplex.chat/blog/20221108-simplex-chat-v4.2-security-audit-new-website.html) 。 -Currently SimpleX Chat only provides a client for Android and iOS. Basic group chatting functionality, direct messaging, editing of messages and markdown are supported. E2EE Audio and Video calls are also supported. +目前, SimpleX Chat 僅爲 Android 和 iOS 提供客戶端。 支援基本羣組聊天功能、直接傳送訊息、編輯訊息和Markdown。 也支持 E2EE 音頻和視頻通話。 -Your data can be exported, and imported onto another device, as there are no central servers where this is backed up. +您可以匯出資料,並匯入到另一個設備,因為沒有中央伺服器備份。 ### Briar !!! recommendation - ![Briar logo](assets/img/messengers/briar.svg){ align=right } + ! [Briar logo] (assets/img/messengers/briar.svg) {align = right} - **Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. + * * Briar * *是 [連接](https://briarproject.org/how-it-works/)其他使用 Tor網路客戶端的加密即時通訊工具。 Briar 還可以在本地附近通過 Wi-Fi 或藍牙連接。 當無法使用網際網路時, Briar 的本地網格(mesh)模式可能很有用。 [:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } [:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } @@ -85,43 +86,43 @@ Your data can be exported, and imported onto another device, as there are no cen [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } [:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } - ??? downloads + ??? 下載 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) - [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) - [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar) -To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. +Briar 要新增聯絡人,必須先彼此互加。 您可以交換 `briar://` 鏈結或是掃瞄對方的二維碼。 -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +客戶端軟體被獨立 [稽核](https://briarproject.org/news/2017-beta-released-security-audit/),而匿名路由協議使用Tor 網路也接受了審計。 -Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). +Briar有一個完整 [發布的規範](https://code.briarproject.org/briar/briar-spec)。 -Briar supports perfect forward secrecy by using the Bramble [Handshake](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BHP.md) and [Transport](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BTP.md) protocol. +Briar 使用 Bramble [Handshake](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BHP.md) 和 [Transport](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BTP.md) 協議支持完美的前向保密。 -## Additional Options +## 額外選項 !!! 警告 - These messengers do not have Perfect [Forward Secrecy](https://en.wikipedia.org/wiki/Forward_secrecy) (PFS), and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications. + 這些通訊軟體沒有 Perfect [Forward Secrecy] (https://zh.wikipedia.org/wiki/Forward_secrecy) (PFS) ,雖然他們滿足了我們推薦產品所無法滿足的某些需求,但不建議長期使用或用在敏感通訊。 訊息收件人之間的任何密鑰洩露都會影響* *所有* *過去通信的機密性。 ### Element !!! recommendation - ![Element logo](assets/img/messengers/element.svg){ align=right } + ! [Element logo] (assets/img/messengers/element.svg) {align = right} - **Element** is the reference client for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. + * * Element * *是 [Matrix](https://matrix.org/docs/guides/introduction)協議的參考用戶端,這是一個[開放標準] (https://matrix.org/docs/spec) 、安全去中心化實時通訊。 - Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. + 在私人聊天室(需透過邀請加入)共享的訊息和文件預設為 E2EE ,一對一的語音和視訊通話也是如此。 [:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/vector-im){ .card-link title="Source Code" } - ??? downloads + ??? 下載 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) - [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) @@ -131,30 +132,33 @@ Briar supports perfect forward secrecy by using the Bramble [Handshake](https:// - [:simple-linux: Linux](https://element.io/get-started) - [:octicons-globe-16: Web](https://app.element.io) -Profile pictures, reactions, and nicknames are not encrypted. +個人資料圖片、反應和暱稱不會加密。 -Group voice and video calls are [not](https://github.com/vector-im/element-web/issues/12878) E2EE, and use Jitsi, but this is expected to change with [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401). Group calls have [no authentication](https://github.com/vector-im/element-web/issues/13074) currently, meaning that non-room participants can also join the calls. We recommend that you do not use this feature for private meetings. +羣組語音和視視通話 [則不是](https://github.com/vector-im/element-web/issues/12878) E2EE ,而是使用Jitsi ,但預計將隨著 [Native Group VoIP Signalling](https://github.com/matrix-org/matrix-doc/pull/3401)而發生變化。 群組通目前 [沒有驗證](https://github.com/vector-im/element-web/issues/13074) ,因此其它人員也可以加入。 我們建議您不要將此功能用於私人會議。 + +Matrix 協議本身 [理論上支援 PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy),但目前Element 不支援 PFS +,因為它破壞一些使用者體驗,例如密鑰備份和共享訊息歷史記錄。

+ +其協議在 2016年獨立進行了 [審計](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) 。 Matrix 協議的規範可以在他們的 [文檔](https://spec.matrix.org/latest/)中找到。 Matrix 使用的 [Olm](https://matrix.org/docs/projects/other/olm) 加密棘輪是Signal [Double Ratchet 演算法](https://signal.org/docs/specifications/doubleratchet/)的實現。 -The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session !!! recommendation - ![Session logo](assets/img/messengers/session.svg){ align=right } + ! [Session logo] (assets/img/messengers/session.svg) {align = right} - **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. + * * Session * *是一款分散式通訊軟體,專注於私密、安全和匿名。 Session 支援直接訊息、羣組聊天和語音通話。 - Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. + Session使用去中心化的[Oxen Service Node Network] (https://oxen.io/)來儲存和路由訊息。 每條加密訊息都通過 Oxen Service Node Network 中三個節點路由,使得節點幾乎不可能編譯有意義信息給此網路的使用者。 [:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } - ??? downloads + ??? 下載 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=network.loki.messenger) - [:simple-appstore: App Store](https://apps.apple.com/app/id1470168868) @@ -162,14 +166,17 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr - [:simple-windows11: Windows](https://getsession.org/download) - [:simple-apple: macOS](https://getsession.org/download) - [:simple-linux: Linux](https://getsession.org/download) + -Session allows for E2EE in one-on-one chats or closed groups which allow for up to 100 members. Open groups have no restriction on the number of members, but are open by design. +會話允許E2EE在一對一聊天或封閉羣組中,最多可容納100名成員。 開放羣組對成員數量沒有限制,從設計上來說是開放的。 -Session does [not](https://getsession.org/blog/session-protocol-technical-information) support PFS, which is when an encryption system automatically and frequently changes the keys it uses to encrypt and decrypt information, such that if the latest key is compromised it exposes a smaller portion of sensitive information. +Session [不](https://getsession.org/blog/session-protocol-technical-information)支援 PFS, PFS 加密系統會自動經常變更密鑰,假如最新密鑰被破壞也只洩漏一小部份敏感資訊。 + +2020年3月Oxen 對 Session 進行獨立審計。 審計 [在2021年4月完成](https://getsession.org/session-code-audit) , “此應用程式整體安全級別良好,可供關注隱私的人使用。 + +Session [白皮書](https://arxiv.org/pdf/2002.04609.pdf) ,描述了應用程式和協議的技術。 -Oxen requested an independent audit for Session in March of 2020. The audit [concluded](https://getsession.org/session-code-audit) in April of 2021, “The overall security level of this application is good and makes it usable for privacy-concerned people.” -Session has a [whitepaper](https://arxiv.org/pdf/2002.04609.pdf) describing the technicals of the app and protocol. ## 標準 @@ -178,18 +185,21 @@ Session has a [whitepaper](https://arxiv.org/pdf/2002.04609.pdf) describing the !!! 示例“此部分是新的” 我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。 + + +- 一定要有開源客戶端。 +- 預設情況下,私人訊息必須使用E2EE。 +- 必須支援所有訊息都可 E2EE。 +- 必須通過獨立審計。 + -- Must have open-source clients. -- Must use E2EE for private messages by default. -- Must support E2EE for all messages. -- Must have been independently audited. ### 最佳案例 最佳案例標準代表了我們希望從這個類別的完美項目應具備的功能。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 -- Should have Perfect Forward Secrecy. -- Should have open-source servers. -- Should be decentralized, i.e. federated or P2P. -- Should use E2EE for all messages by default. -- Should support Linux, macOS, Windows, Android, and iOS. +- 要有完美的向前保密機制。 +- 應該有開源伺服器。 +- 應該是分散的,即聯邦式或 P2P。 +- 預設情況下,所有訊息皆應使用 E2EE。 +- 應支持Linux、macOS、Windows、Android和iOS。 diff --git a/i18n/zh-Hant/router.md b/i18n/zh-Hant/router.md index 8b34d6db..236cfacb 100644 --- a/i18n/zh-Hant/router.md +++ b/i18n/zh-Hant/router.md @@ -2,6 +2,7 @@ title: "路由器軔體" icon: material/router-wireless description: 這些替代作業系統可用於保護您的路由器或Wi-Fi接入點。 +cover: router.png --- 以下是一些替代操作系統,可用於路由器, Wi-Fi接入點等。 diff --git a/i18n/zh-Hant/search-engines.md b/i18n/zh-Hant/search-engines.md index a36ee575..593f14d9 100644 --- a/i18n/zh-Hant/search-engines.md +++ b/i18n/zh-Hant/search-engines.md @@ -3,6 +3,7 @@ meta_title: "推薦搜尋引擎: 匿名的 Google 替代方案 - Privacy Guides" title: "搜尋引擎" icon: material/search-web description: 這些尊重隱私的搜尋引擎不會根據您的搜尋建立廣告剖繪。 +cover: search-engines.png --- 這些尊重隱私的搜尋引擎不會根據您的搜尋建立廣告剖繪。 diff --git a/i18n/zh-Hant/tor.md b/i18n/zh-Hant/tor.md index 3838f235..d23b9f4f 100644 --- a/i18n/zh-Hant/tor.md +++ b/i18n/zh-Hant/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor瀏覽器與網絡:匿名網頁瀏覽 - Privacy Guides" title: "Tor 網絡" icon: simple/torproject description: 透過Tor 網絡來保護您的網際網路瀏覽免受窺探, Tor 網絡是一個規避審查的安全網絡。 +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/video-streaming.md b/i18n/zh-Hant/video-streaming.md index e6947cec..8f887688 100644 --- a/i18n/zh-Hant/video-streaming.md +++ b/i18n/zh-Hant/video-streaming.md @@ -2,6 +2,7 @@ title: "影片串流" icon: material/video-wireless description: 這些服務可讓您串流互聯網內容,而不會記錄個人興趣建立廣告剖繪。 +cover: video-streaming.png --- 使用影片串流平臺時的主要威脅是您的串流習慣和訂閱清單可能被用來剖繪分析您的個人喜好。 您應該將這些工具與 [VPN](vpn.md) 或 [Tor](https://www.torproject.org/) 相結合,以便更難分析您的使用情況。 diff --git a/i18n/zh-Hant/vpn.md b/i18n/zh-Hant/vpn.md index 01d3f14b..40ebac68 100644 --- a/i18n/zh-Hant/vpn.md +++ b/i18n/zh-Hant/vpn.md @@ -3,6 +3,7 @@ meta_title: "私密 VPN 服務建議和比較,沒有贊助商或廣告-Privacy title: "VPN 服務" icon: material/vpn description: 這些是保護您線上隱私和安全的最佳 VPN 服務。 在這裡找一個不會監視您的供應商。 +cover: vpn.png --- 連接到網際網路連線供應商、公共Wi-Fi 網路或下載文件時,如何能有更好的 **隱私**保護 ,只要了解所涉及的風險, VPN 可能是您的解決方案。 我們認為這些供應商高於其他供應商: diff --git a/i18n/zh/android.md b/i18n/zh/android.md index 530764ff..c25be595 100644 --- a/i18n/zh/android.md +++ b/i18n/zh/android.md @@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "安卓" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +cover: android.png schema: - "@context": http://schema.org diff --git a/i18n/zh/calendar.md b/i18n/zh/calendar.md index eb360e48..0d57f15c 100644 --- a/i18n/zh/calendar.md +++ b/i18n/zh/calendar.md @@ -2,6 +2,7 @@ title: "VPN供应商" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. +cover: calendar.png --- 日历包含一些最敏感的数据;使用静态实现E2EE的产品,以防止提供商读取它们。 diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md index d19e2a18..ce690c19 100644 --- a/i18n/zh/cloud.md +++ b/i18n/zh/cloud.md @@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "路由器固件" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! +cover: cloud.png --- 许多云存储供应商需要你完全信任他们不会查看你的文件。 The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/zh/cryptocurrency.md b/i18n/zh/cryptocurrency.md index 69b72421..545e5930 100644 --- a/i18n/zh/cryptocurrency.md +++ b/i18n/zh/cryptocurrency.md @@ -2,6 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle +cover: cryptocurrency.png --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/zh/data-redaction.md b/i18n/zh/data-redaction.md index 2cb1d9e8..1f717459 100644 --- a/i18n/zh/data-redaction.md +++ b/i18n/zh/data-redaction.md @@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "日历/联系人同步" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. +cover: data-redaction.png --- 共享文件时,请务必删除关联的元数据。 图像文件通常包括 [Exif](https://en.wikipedia.org/wiki/Exif) 数据。 照片有时甚至包括文件元数据中的GPS坐标。 diff --git a/i18n/zh/desktop-browsers.md b/i18n/zh/desktop-browsers.md index 897ba6c8..e3303ec5 100644 --- a/i18n/zh/desktop-browsers.md +++ b/i18n/zh/desktop-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "电脑浏览器" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. +cover: desktop-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/zh/desktop.md b/i18n/zh/desktop.md index 7b1d9b31..4f151edc 100644 --- a/i18n/zh/desktop.md +++ b/i18n/zh/desktop.md @@ -2,6 +2,7 @@ title: "Android 应用" icon: simple/linux description: 由于隐私保护和软件自由,Linux发行版被普遍推荐。 +cover: desktop.png --- 由于隐私保护和软件自由,Linux发行版被普遍推荐。 如果你还没有使用Linux,下面是我们建议尝试的一些发行版,以及一些适用于许多Linux发行版的一般隐私和安全改进提示。 diff --git a/i18n/zh/dns.md b/i18n/zh/dns.md index 5f63c24d..332843d5 100644 --- a/i18n/zh/dns.md +++ b/i18n/zh/dns.md @@ -2,6 +2,7 @@ title: "DNS解析器" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. +cover: dns.png --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. 加密的DNS不会帮助你隐藏任何浏览活动。 diff --git a/i18n/zh/email-clients.md b/i18n/zh/email-clients.md index 3b1b7cd1..981bac76 100644 --- a/i18n/zh/email-clients.md +++ b/i18n/zh/email-clients.md @@ -2,6 +2,7 @@ title: "笔记" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. +cover: email-clients.png --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/zh/email.md b/i18n/zh/email.md index 00aec09b..cf80c340 100644 --- a/i18n/zh/email.md +++ b/i18n/zh/email.md @@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. +cover: email.png --- 电子邮件实际上是使用任何在线服务的必需品,但我们不建议使用它进行人与人之间的对话。 与其使用电子邮件与他人联系,不如考虑使用支持前向保密的即时通讯媒介。 diff --git a/i18n/zh/encryption.md b/i18n/zh/encryption.md index e9e9b93e..92aafb3e 100644 --- a/i18n/zh/encryption.md +++ b/i18n/zh/encryption.md @@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "加密软件" icon: material/file-lock description: 对数据进行加密是控制谁能访问数据的唯一方法。 These tools allow you to encrypt your emails and any other files. +cover: encryption.png --- 对数据进行加密是控制谁能访问数据的唯一方法。 如果你目前没有对你的硬盘、电子邮件或文件使用加密软件,你应该在这里挑选一个选项。 diff --git a/i18n/zh/file-sharing.md b/i18n/zh/file-sharing.md index bae918b2..beab267e 100644 --- a/i18n/zh/file-sharing.md +++ b/i18n/zh/file-sharing.md @@ -2,6 +2,7 @@ title: "加密软件" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. +cover: file-sharing.png --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/zh/financial-services.md b/i18n/zh/financial-services.md index f61b90ea..d6b78803 100644 --- a/i18n/zh/financial-services.md +++ b/i18n/zh/financial-services.md @@ -1,6 +1,7 @@ --- title: Financial Services icon: material/bank +cover: financial-services.png --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/zh/frontends.md b/i18n/zh/frontends.md index 6c2ceb93..5bf20396 100644 --- a/i18n/zh/frontends.md +++ b/i18n/zh/frontends.md @@ -2,6 +2,7 @@ title: "文件共享" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. +cover: frontends.png --- 有时,一些服务会用烦人的弹窗阻止你访问内容,以此来强迫你注册账户。 此时如果停用JavaScript网站也会崩溃。 这些前端应用可以帮助你绕过这些限制。 diff --git a/i18n/zh/mobile-browsers.md b/i18n/zh/mobile-browsers.md index 9d7eaa26..e9456e17 100644 --- a/i18n/zh/mobile-browsers.md +++ b/i18n/zh/mobile-browsers.md @@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "移动浏览器" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +cover: mobile-browsers.png schema: - "@context": http://schema.org diff --git a/i18n/zh/multi-factor-authentication.md b/i18n/zh/multi-factor-authentication.md index 7dd60e29..623449a2 100644 --- a/i18n/zh/multi-factor-authentication.md +++ b/i18n/zh/multi-factor-authentication.md @@ -2,6 +2,7 @@ title: "Multi-Factor Authenticators" icon: '资料/双因认证' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. +cover: multi-factor-authentication.png --- ## 硬件安全密钥 diff --git a/i18n/zh/news-aggregators.md b/i18n/zh/news-aggregators.md index 63e2b18f..3127aab2 100644 --- a/i18n/zh/news-aggregators.md +++ b/i18n/zh/news-aggregators.md @@ -2,6 +2,7 @@ title: "多因素认证工具" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. +cover: news-aggregators.png --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/zh/notebooks.md b/i18n/zh/notebooks.md index cbdba1e9..059eaf1c 100644 --- a/i18n/zh/notebooks.md +++ b/i18n/zh/notebooks.md @@ -2,6 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +cover: notebooks.png --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/zh/passwords.md b/i18n/zh/passwords.md index cf3920d2..19701951 100644 --- a/i18n/zh/passwords.md +++ b/i18n/zh/passwords.md @@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "生产力工具" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. +cover: passwords.png schema: - "@context": http://schema.org diff --git a/i18n/zh/productivity.md b/i18n/zh/productivity.md index ca8122bb..36e8cd96 100644 --- a/i18n/zh/productivity.md +++ b/i18n/zh/productivity.md @@ -2,6 +2,7 @@ title: "实时通讯" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. +cover: productivity.png --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/zh/real-time-communication.md b/i18n/zh/real-time-communication.md index b522ef9d..c0aaa7f3 100644 --- a/i18n/zh/real-time-communication.md +++ b/i18n/zh/real-time-communication.md @@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "实时通讯" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. +cover: real-time-communication.png --- 这些是我们对加密实时通讯的建议。 diff --git a/i18n/zh/router.md b/i18n/zh/router.md index 6374dcd7..903e3f36 100644 --- a/i18n/zh/router.md +++ b/i18n/zh/router.md @@ -2,6 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. +cover: router.png --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/zh/search-engines.md b/i18n/zh/search-engines.md index c951d016..8aef9fea 100644 --- a/i18n/zh/search-engines.md +++ b/i18n/zh/search-engines.md @@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. +cover: search-engines.png --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/zh/tor.md b/i18n/zh/tor.md index b37a618c..d4793712 100644 --- a/i18n/zh/tor.md +++ b/i18n/zh/tor.md @@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "桌面端浏览器" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. +cover: tor.png schema: - "@context": http://schema.org diff --git a/i18n/zh/video-streaming.md b/i18n/zh/video-streaming.md index 2aceac4a..46de8d2d 100644 --- a/i18n/zh/video-streaming.md +++ b/i18n/zh/video-streaming.md @@ -2,6 +2,7 @@ title: "视频串流" icon: 资料/视频-无线 description: These networks allow you to stream internet content without building an advertising profile based on your interests. +cover: video-streaming.png --- 使用视频流媒体平台时的主要威胁是,你的流媒体习惯和订阅名单可能被用来对你进行分析。 你应该将这些工具与 [VPN](vpn.md) 或 [Tor](https://www.torproject.org/) 结合起来,以使你的使用情况更难被分析。 diff --git a/i18n/zh/vpn.md b/i18n/zh/vpn.md index 684a5260..a20555bc 100644 --- a/i18n/zh/vpn.md +++ b/i18n/zh/vpn.md @@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: 资料/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. +cover: vpn.png --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/includes/abbreviations.he.txt b/includes/abbreviations.he.txt index fa00a6e7..1b514c4a 100644 --- a/includes/abbreviations.he.txt +++ b/includes/abbreviations.he.txt @@ -20,7 +20,7 @@ *[EEA]: European Economic Area *[entropy]: A measurement of how unpredictable something is *[EOL]: סוף החיים -*[Exif]: Exchangeable image file format +*[Exif]: פורמט קובץ תמונה ניתן להחלפה *[FCM]: Firebase Cloud Messaging *[FDE]: הצפנת דיסק מלאה *[FIDO]: Fast IDentity Online @@ -44,7 +44,7 @@ *[IPv6]: פרוטוקול אינטרנט גרסה 6 *[ISP]: ספק שירותי אינטרנט *[ISPs]: ספקי שירותי אינטרנט -*[JNI]: Java Native Interface +*[JNI]: ממשק מקורי של Java *[KYC]: Know Your Customer *[LUKS]: Linux Unified Key Setup (Full-Disk Encryption) *[MAC]: Media Access Control diff --git a/includes/strings.he.yml b/includes/strings.he.yml index 502a1a0d..71ef8bca 100644 --- a/includes/strings.he.yml +++ b/includes/strings.he.yml @@ -5,23 +5,23 @@ config: copyright: - 1: | - Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy. + Privacy Guides הוא אתר ללא מטרות רווח, בעל מוטיבציה חברתית, המספק מידע להגנה על אבטחת הנתונים ופרטיותך. - 2: | - We do not make money from recommending certain products, and we do not use affiliate links. + אנחנו לא מרוויחים כסף מהמלצה על מוצרים מסוימים, ואיננו משתמשים בקישורי שותפים. - 3: | - Privacy Guides and contributors. + Privacy Guides ותורמים. - 4: | - Content licensed under CC BY-ND 4.0. + תוכן מורשה תחת CC BY-ND 4.0. feedback: question: האם הדף הזה עזר לך? yes: הדף הזה היה מועיל yes-note: תודה על המשוב שלך! no: דף זה יכול להשתפר no-note: | - Thanks for your feedback! Help us improve this page by opening a discussion on our forum. + תודה על המשוב שלך! עזור לנו לשפר את הדף הזה על ידי פתיחת דיון בפורום שלנו. theme: dark: עבור למצב כהה light: עבור למצב בהיר @@ -37,15 +37,15 @@ nav: Providers: ספקים Software: תוכנה About: על אודות - Community: Community + Community: קהילה Online Services: שירותים מקוונים - Code of Conduct: Code of Conduct - Contributing: Contributing - Writing Guide: Writing Guide - Technical Guides: Technical Guides + Code of Conduct: קוד התנהגות + Contributing: תרומה + Writing Guide: מדריך כתיבה + Technical Guides: מדריכים טכניים Changelog: יומן שינויים Forum: פורום Blog: בלוג site: translation: | - You're viewing the English copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out! + אתה צופה בעותק האנגלי של מדריכי הפרטיות, שתורגם על ידי צוות השפה הפנטסטי שלנו ב-Crowdin. אם אתה מבחין בשגיאה, או רואה קטעים לא מתורגמים בדף זה, אנא שקול לעזור! diff --git a/theme/overrides/home.ar.html b/theme/overrides/home.ar.html index 680e65ff..12f2e2a6 100644 --- a/theme/overrides/home.ar.html +++ b/theme/overrides/home.ar.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.bn.html b/theme/overrides/home.bn.html index f4fd10f7..54a2ca6b 100644 --- a/theme/overrides/home.bn.html +++ b/theme/overrides/home.bn.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.cs.html b/theme/overrides/home.cs.html index 9605e7a6..e7371f59 100644 --- a/theme/overrides/home.cs.html +++ b/theme/overrides/home.cs.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.de.html b/theme/overrides/home.de.html index cf8c2134..8aa6dc1c 100644 --- a/theme/overrides/home.de.html +++ b/theme/overrides/home.de.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.el.html b/theme/overrides/home.el.html index bb6f4b34..32301971 100644 --- a/theme/overrides/home.el.html +++ b/theme/overrides/home.el.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.eo.html b/theme/overrides/home.eo.html index 2b4df311..8d5c73c9 100644 --- a/theme/overrides/home.eo.html +++ b/theme/overrides/home.eo.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.es.html b/theme/overrides/home.es.html index 90dafd53..3078df14 100644 --- a/theme/overrides/home.es.html +++ b/theme/overrides/home.es.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.fa.html b/theme/overrides/home.fa.html index bc046c80..d80f2a82 100644 --- a/theme/overrides/home.fa.html +++ b/theme/overrides/home.fa.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.fr.html b/theme/overrides/home.fr.html index 43ade0ea..91475e0c 100644 --- a/theme/overrides/home.fr.html +++ b/theme/overrides/home.fr.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.he.html b/theme/overrides/home.he.html index 63c0e334..b28951d4 100644 --- a/theme/overrides/home.he.html +++ b/theme/overrides/home.he.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.hi.html b/theme/overrides/home.hi.html index 2b4df311..8d5c73c9 100644 --- a/theme/overrides/home.hi.html +++ b/theme/overrides/home.hi.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.hu.html b/theme/overrides/home.hu.html index 6be43237..18cf5e00 100644 --- a/theme/overrides/home.hu.html +++ b/theme/overrides/home.hu.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.id.html b/theme/overrides/home.id.html index 2de49786..0348c927 100644 --- a/theme/overrides/home.id.html +++ b/theme/overrides/home.id.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.it.html b/theme/overrides/home.it.html index d3494eb0..1c1023dd 100644 --- a/theme/overrides/home.it.html +++ b/theme/overrides/home.it.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.ja.html b/theme/overrides/home.ja.html index 3423d3f2..41d826c8 100644 --- a/theme/overrides/home.ja.html +++ b/theme/overrides/home.ja.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.ko.html b/theme/overrides/home.ko.html index 1b6aa5ee..5b7b5c75 100644 --- a/theme/overrides/home.ko.html +++ b/theme/overrides/home.ko.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.ku-IQ.html b/theme/overrides/home.ku-IQ.html index 8774f47e..d7cc58d1 100644 --- a/theme/overrides/home.ku-IQ.html +++ b/theme/overrides/home.ku-IQ.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.nl.html b/theme/overrides/home.nl.html index 1b45e309..1fabd075 100644 --- a/theme/overrides/home.nl.html +++ b/theme/overrides/home.nl.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.pl.html b/theme/overrides/home.pl.html index e5861e47..655114eb 100644 --- a/theme/overrides/home.pl.html +++ b/theme/overrides/home.pl.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.pt-BR.html b/theme/overrides/home.pt-BR.html index 28cfcff6..4a8c8217 100644 --- a/theme/overrides/home.pt-BR.html +++ b/theme/overrides/home.pt-BR.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.pt.html b/theme/overrides/home.pt.html index 2b4df311..8d5c73c9 100644 --- a/theme/overrides/home.pt.html +++ b/theme/overrides/home.pt.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.ru.html b/theme/overrides/home.ru.html index b459a40e..5974e29b 100644 --- a/theme/overrides/home.ru.html +++ b/theme/overrides/home.ru.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.sv.html b/theme/overrides/home.sv.html index c7e2d88c..2fea8d27 100644 --- a/theme/overrides/home.sv.html +++ b/theme/overrides/home.sv.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.tr.html b/theme/overrides/home.tr.html index f80d51fc..ffacda54 100644 --- a/theme/overrides/home.tr.html +++ b/theme/overrides/home.tr.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.uk.html b/theme/overrides/home.uk.html index bd5c88d4..920d5791 100644 --- a/theme/overrides/home.uk.html +++ b/theme/overrides/home.uk.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.vi.html b/theme/overrides/home.vi.html index 9dca41c7..bb986de0 100644 --- a/theme/overrides/home.vi.html +++ b/theme/overrides/home.vi.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.zh-Hant.html b/theme/overrides/home.zh-Hant.html index c3534252..67012727 100644 --- a/theme/overrides/home.zh-Hant.html +++ b/theme/overrides/home.zh-Hant.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %} diff --git a/theme/overrides/home.zh.html b/theme/overrides/home.zh.html index ef59f1d1..38f5da2b 100644 --- a/theme/overrides/home.zh.html +++ b/theme/overrides/home.zh.html @@ -23,6 +23,10 @@ {% extends "main.html" %} {% block extrahead %} + + + + {{ super() }} {% endblock %} {% block tabs %}