1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-08-30 09:59:20 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-08-21 20:35:24 +00:00
parent 24007a865e
commit 77fa598650
9 changed files with 207 additions and 207 deletions

View File

@@ -11,26 +11,26 @@ Privacy Guides aspires to obtain funding from a wide variety of sources to reduc
In the course of our regular fundraising activities...
- Donations and other forms of support will generally be accepted from individuals, corporations, foundations, or other entities, without limitations.
- This includes cash, cash equivalents (checks, money orders, credit/debit card payments), and cryptocurrency.
- Gifts of Real Property, Personal Property, or Securities may only be accepted upon approval of the MAGIC Grants board of directors.
- Donations and other forms of support will generally be accepted from individuals, corporations, foundations, or other entities, without limitations.
- This includes cash, cash equivalents (checks, money orders, credit/debit card payments), and cryptocurrency.
- Gifts of Real Property, Personal Property, or Securities may only be accepted upon approval of the MAGIC Grants board of directors.
Privacy Guides will only accept such gifts that are legal and consistent with our policies. Gifts must not interfere with Privacy Guides' mission, purpose, and procedures.
## Things we do **not** do
- Accept sponsorships.
- Offer to recommend a product or service in exchange for a donation or other incentive.
- Threaten to remove a recommendation for a product or service unless we receive a donation or other incentive.
- Offer to expedite a review of a product or service in exchange for a donation or other incentive.
- Write sponsored content or feature sponsored components in our content.
- Accept sponsorships.
- Offer to recommend a product or service in exchange for a donation or other incentive.
- Threaten to remove a recommendation for a product or service unless we receive a donation or other incentive.
- Offer to expedite a review of a product or service in exchange for a donation or other incentive.
- Write sponsored content or feature sponsored components in our content.
## Things we **may** do
- Accept donations from privacy-related companies and non-profits.
- Apply for grant programs.
- Accept free versions of software or hardware to test and review, while being mindful of possible differences in versions that could differ from a regular customer experience. ([More details](executive-policy.md#ep1-freely-provided-product-samples))
- Accept discounted versions of software or hardware that assist our operations (for example, discounted software costs made available to non-profits).
- Accept donations from privacy-related companies and non-profits.
- Apply for grant programs.
- Accept free versions of software or hardware to test and review, while being mindful of possible differences in versions that could differ from a regular customer experience. ([More details](executive-policy.md#ep1-freely-provided-product-samples))
- Accept discounted versions of software or hardware that assist our operations (for example, discounted software costs made available to non-profits).
## Restrictions on gifts
@@ -40,10 +40,10 @@ We also accept and appreciate gifts for specified programs or purposes, provided
Examples of gifts which are too restrictive include:
- Those which fund the research and review of a specific product category or specific product.
- Those which violate our existing policies.
- Those which are too difficult for us to administer.
- Those that are for purposes outside our general mission.
- Those which fund the research and review of a specific product category or specific product.
- Those which violate our existing policies.
- Those which are too difficult for us to administer.
- Those that are for purposes outside our general mission.
An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum.

View File

@@ -8,9 +8,9 @@ cover: ai-chatbots.webp
<small>Protects against the following threat(s):</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
The use of **AI chat**, also known as Large Language Models (LLMs), has become increasingly common since the release of ChatGPT in 2022. LLMs can help us write better, understand unfamiliar subjects, or answer a wide range of questions. They work by statistically predicting the next word in their responses based on a vast amount of data scraped from the web.
@@ -74,9 +74,9 @@ In addition to supporting a large range of text models, Kobold.cpp also supports
<details class="downloads" markdown><0>Scarica</0>
- [:fontawesome-brands-windows: Windows](https://github.com/LostRuins/koboldcpp/releases)
- [:simple-apple: macOS](https://github.com/LostRuins/koboldcpp/releases)
- [:simple-linux: Linux](https://github.com/LostRuins/koboldcpp/releases)
- [:fontawesome-brands-windows: Windows](https://github.com/LostRuins/koboldcpp/releases)
- [:simple-apple: macOS](https://github.com/LostRuins/koboldcpp/releases)
- [:simple-linux: Linux](https://github.com/LostRuins/koboldcpp/releases)
</details>
@@ -108,9 +108,9 @@ In addition to supporting a wide range of text models, Ollama also supports [LLa
<details class="downloads" markdown><0>Scarica</0>
- [:fontawesome-brands-windows: Windows](https://ollama.com/download/windows)
- [:simple-apple: macOS](https://ollama.com/download/mac)
- [:simple-linux: Linux](https://ollama.com/download/linux)
- [:fontawesome-brands-windows: Windows](https://ollama.com/download/windows)
- [:simple-apple: macOS](https://ollama.com/download/mac)
- [:simple-linux: Linux](https://ollama.com/download/linux)
</details>
@@ -135,9 +135,9 @@ Llamafile also supports LLaVA. However, it doesn't support speech recognition or
<details class="downloads" markdown><0>Scarica</0>
- [:fontawesome-brands-windows: Windows](https://github.com/Mozilla-Ocho/llamafile#quickstart)
- [:simple-apple: macOS](https://github.com/Mozilla-Ocho/llamafile#quickstart)
- [:simple-linux: Linux](https://github.com/Mozilla-Ocho/llamafile#quickstart)
- [:fontawesome-brands-windows: Windows](https://github.com/Mozilla-Ocho/llamafile#quickstart)
- [:simple-apple: macOS](https://github.com/Mozilla-Ocho/llamafile#quickstart)
- [:simple-linux: Linux](https://github.com/Mozilla-Ocho/llamafile#quickstart)
</details>
@@ -155,12 +155,12 @@ We recommend downloading model files from Hugging Face since it provides several
To check the authenticity and safety of the model, look for:
- Model cards with clear documentation
- A verified organization badge
- Community reviews and usage statistics
- A "Safe" badge next to the model file (Hugging Face only)
- Matching checksums[^1]
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
- Model cards with clear documentation
- A verified organization badge
- Community reviews and usage statistics
- A "Safe" badge next to the model file (Hugging Face only)
- Matching checksums[^1]
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
A downloaded model is generally safe if it satisfies all the above checks.
@@ -170,20 +170,20 @@ Please note we are not affiliated with any of the projects we recommend. In addi
### Requisiti minimi
- Deve essere open source.
- Must not transmit personal data, including chat data.
- Must be multi-platform.
- Must not require a GPU.
- Must support GPU-powered, fast inference.
- Must not require an internet connection.
- Deve essere open source.
- Must not transmit personal data, including chat data.
- Must be multi-platform.
- Must not require a GPU.
- Must support GPU-powered, fast inference.
- Must not require an internet connection.
### Caso migliore
Our best-case criteria represent what we _would_ like to see from the perfect project in this category. I nostri consigli potrebbero non includere tutte o alcune di queste funzionalità, ma quelli che le includono potrebbero essere preferiti ad altri su questa pagina.
- Should be easy to download and set up, e.g. with a one-click installation process.
- Should have a built-in model downloader option.
- The user should be able to modify the LLM parameters, such as its system prompt or temperature.
- Should be easy to download and set up, e.g. with a one-click installation process.
- Should have a built-in model downloader option.
- The user should be able to modify the LLM parameters, such as its system prompt or temperature.
\*[LLaVA]: Large Language and Vision Assistant (multimodal AI model)
\*[LLM]: Large Language Model (AI model such as ChatGPT)

View File

@@ -7,9 +7,9 @@ cover: alternative-networks.webp
<small>Protects against the following threat(s):</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue }
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue }
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
## Anonymizing Networks
@@ -60,10 +60,10 @@ You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh
<details class="downloads" markdown><0>Scarica</0>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599)
- [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
- [:simple-fdroid: F-Droid](https://guardianproject.info/fdroid)
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599)
- [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
- [:simple-fdroid: F-Droid](https://guardianproject.info/fdroid)
</details>
@@ -129,11 +129,11 @@ Running a Snowflake proxy is low-risk, even more so than running a Tor relay or
<details class="downloads" markdown><0>Scarica</0>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android)
- [:simple-android: Android](https://geti2p.net/it/download#android)
- [:fontawesome-brands-windows: Windows](https://geti2p.net/en/download#windows)
- [:simple-apple: macOS](https://geti2p.net/it/download#mac)
- [:simple-linux: Linux](https://geti2p.net/it/download#unix)
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android)
- [:simple-android: Android](https://geti2p.net/it/download#android)
- [:fontawesome-brands-windows: Windows](https://geti2p.net/en/download#windows)
- [:simple-apple: macOS](https://geti2p.net/it/download#mac)
- [:simple-linux: Linux](https://geti2p.net/it/download#unix)
</details>

View File

@@ -20,7 +20,7 @@ There are many ways to obtain Android apps privately, even from the Play Store,
<details class="downloads" markdown><0>Scarica</0>
- [:simple-github: GitHub](https://github.com/ImranR98/Obtainium/releases)
- [:simple-github: GitHub](https://github.com/ImranR98/Obtainium/releases)
</details>
@@ -48,7 +48,7 @@ The Google Play Store requires a Google account to log in, which is not great fo
<details class="downloads" markdown><0>Scarica</0>
- [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases)
- [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases)
</details>
@@ -84,26 +84,26 @@ If you download APK files to install manually, you can verify their signature wi
3. Extract the downloaded archive:
```bash
unzip commandlinetools-*.zip
cd cmdline-tools
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
```
```bash
unzip commandlinetools-*.zip
cd cmdline-tools
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
```
4. Run the signature verification command:
```bash
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
```
```bash
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
```
5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website.
```bash
Signer #1 certificate DN: CN=GrapheneOS
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
```
```bash
Signer #1 certificate DN: CN=GrapheneOS
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
```
## F-Droid

View File

@@ -27,17 +27,17 @@ Ciò significa che un aggressore dovrebbe reinfettare regolarmente il dispositiv
Se uno dei seguenti strumenti indica una potenziale compromissione da parte di spyware come Pegasus, Predator o KingsPawn, consigliamo di contattare:
- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us)
- If a business or government device is compromised: the appropriate security liaison at your enterprise, department, or agency
- Forze dell'ordine locali
- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us)
- If a business or government device is compromised: the appropriate security liaison at your enterprise, department, or agency
- Forze dell'ordine locali
**Non possiamo aiutarti più di così in maniera diretta.** Siamo lieti di discutere della tua situazione o delle circostanze specifiche e di revisionare i tuoi risultati negli spazi della nostra [community](https://discuss.privacyguides.net), ma è improbabile che potremo aiutarti più di quanto è scritto su questa pagina.
Gli strumenti su questa pagina possono esclusivamente rilevare gli indicatori di compromissione, non rimuoverli. Se temi di esser stato compromesso, ti consigliamo di:
- Considerare la completa sostituzione del dispositivo
- Considerare di cambiare il tuo numero SIM/eSIM
- Non ripristinare da un backup, poiché, questo, potrebbe essere compromesso
- Considerare la completa sostituzione del dispositivo
- Considerare di cambiare il tuo numero SIM/eSIM
- Non ripristinare da un backup, poiché, questo, potrebbe essere compromesso
Questi strumenti forniscono analisi basate sulle informazioni a cui possono accedere dal tuo dispositivo e sugli indicatori di compromissione accessibili pubblicamente. È importante tenere a mente due cose:
@@ -48,7 +48,7 @@ Questi strumenti forniscono analisi basate sulle informazioni a cui possono acce
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
External verification tools run on your computer and scan your mobile device for forensic traces, which are helpful to identify potential compromise.
@@ -80,8 +80,8 @@ Il **Mobile Verification Toolkit** (**MVT**) è una raccolta di utility che semp
<details class="downloads" markdown>
<summary>Scarica</summary>
- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install)
- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install)
- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
</details>
@@ -102,7 +102,7 @@ Se utilizzi iOS e sei ad alto rischio, abbiamo altri tre suggerimenti per te:
2. Attiva spesso i registri di _sysdiagnose_ ed eseguine il backup esternamente. Questi, possono fornire dati preziosi ai futuri investigatori forensi, se necessario.
Il procedimento per farlo varia a seconda del modello, ma puoi attivarlo sui telefoni più nuovi tenendo premuti _Accensione_ + _Volume Su_ + _Volume Giù_, finché non avverti una breve vibrazione. Dopo qualche minuto, il registro _sysdiagnose_ con data e ora, apparirà in **Impostazioni** > **Privacy e Sicurezza** > **Analisi e Miglioramenti** > **Dati Analitici**.
Il procedimento per farlo varia a seconda del modello, ma puoi attivarlo sui telefoni più nuovi tenendo premuti _Accensione_ + _Volume Su_ + _Volume Giù_, finché non avverti una breve vibrazione. Dopo qualche minuto, il registro _sysdiagnose_ con data e ora, apparirà in **Impostazioni** > **Privacy e Sicurezza** > **Analisi e Miglioramenti** > **Dati Analitici**.
3. Abilita la [Modalità di Blocco](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode).
@@ -123,8 +123,8 @@ MVT ti consente di eseguire scansioni/analisi più approfondite, se il tuo dispo
<details class="downloads" markdown>
<summary>Scarica</summary>
- [:fontawesome-brands-windows: Windows](https://imazing.com/download)
- [:simple-apple: macOS](https://imazing.com/download)
- [:fontawesome-brands-windows: Windows](https://imazing.com/download)
- [:simple-apple: macOS](https://imazing.com/download)
</details>
@@ -136,8 +136,8 @@ iMazing automatizza e ti guida interattivamente al procedimento di utilizzo di [
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
Si tratta di app installabili che controllano il tuo dispositivo e il sistema operativo, in cerca di segni di manomissione, convalidandone l'identità.
@@ -166,9 +166,9 @@ L'utilizzo di queste app non è sufficiente per determinarre che un dispositivo
<details class="downloads" markdown>
<summary>Scarica</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play)
- [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases)
- [:material-cube-outline: GrapheneOS App Store](https://github.com/GrapheneOS/Apps/releases)
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play)
- [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases)
- [:material-cube-outline: GrapheneOS App Store](https://github.com/GrapheneOS/Apps/releases)
</details>
@@ -178,11 +178,11 @@ Auditor is not a scanning/analysis tool like some other tools on this page. Rath
Auditor esegue l'attestazione e il rilevamento delle intrusioni con **due** dispositivi, un **controllato** (il dispositivo da verificare) e un **controllore** (il dispositivo che esegue la verifica). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android/distributions.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor opera:
- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_.
- Il _controllore_ può essere un'altra istanza dell'app di Auditor o il [Servizio di Attestazione da Remoto](https://attestation.app).
- Il _controllore_ registra lo stato corrente e la configurazione del _controllato_.
- Dovesse verificarsi la manomissione del sistema operativo del _controllato_ dopo il completamento dell'associazione, il controllore sarà a conoscenza del cambiamento nello stato e nelle configurazioni del dispositivo.
- Riceverai un avviso del cambiamento.
- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_.
- Il _controllore_ può essere un'altra istanza dell'app di Auditor o il [Servizio di Attestazione da Remoto](https://attestation.app).
- Il _controllore_ registra lo stato corrente e la configurazione del _controllato_.
- Dovesse verificarsi la manomissione del sistema operativo del _controllato_ dopo il completamento dell'associazione, il controllore sarà a conoscenza del cambiamento nello stato e nelle configurazioni del dispositivo.
- Riceverai un avviso del cambiamento.
È importante notare che il Controllore può effettivamente rilevare i cambiamenti soltanto **dopo** l'associazione iniziale, non necessariamente durante o prima, a causa del suo modello TOFU. Per assicurarti che il tuo hardware e sistema operativo siano autentici, [esegui l'attestazione locale](https://grapheneos.org/install/web#verifying-installation) immediatamente dopo l'installazione del dispositivo e prima di qualsiasi connessione a Internet.

View File

@@ -199,7 +199,7 @@ Questo formato viene utilizzato per generare schede di raccomandazione. In parti
<details class="downloads" markdown>
<summary>Scarica</summary>
- [:simple-github: GitHub](https://github.com/photoprism)
- [:simple-github: GitHub](https://github.com/photoprism)
</details>
@@ -231,13 +231,13 @@ This is a special type of collapsible admonition which is used to generate secti
<details class="downloads" markdown>
<summary>Scarica</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905)
- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases)
- [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download)
- [:simple-apple: macOS](https://proton.me/mail/bridge#download)
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
- [:octicons-browser-16: Web](https://mail.proton.me)
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905)
- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases)
- [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download)
- [:simple-apple: macOS](https://proton.me/mail/bridge#download)
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
- [:octicons-browser-16: Web](https://mail.proton.me)
</details>

View File

@@ -19,29 +19,29 @@ Per modificare un criterio di gruppo, fare doppio clic su di esso e selezionare
#### Device Guard
- Attiva Sicurezza Basata Sulla Virtualizzazione: **Abilitato**
- Livello di sicurezza della piattaforma: **Avvio sicuro e protezione DMA**
- Configurazione Secure Launch: **Abilitato**
- Attiva Sicurezza Basata Sulla Virtualizzazione: **Abilitato**
- Livello di sicurezza della piattaforma: **Avvio sicuro e protezione DMA**
- Configurazione Secure Launch: **Abilitato**
#### Gestione delle comunicazioni Internet
- Disattiva il programma di miglioramento dell'esperienza clienti di Windows: **Abilitato**
- Disattiva segnalazione errori di Windows: **Abilitato**
- Disattiva il programma di miglioramento dell'esperienza dei clienti di Windows Messenger: **Abilitato**
- Disattiva il programma di miglioramento dell'esperienza clienti di Windows: **Abilitato**
- Disattiva segnalazione errori di Windows: **Abilitato**
- Disattiva il programma di miglioramento dell'esperienza dei clienti di Windows Messenger: **Abilitato**
Si noti che la disabilitazione del programma di miglioramento dell'esperienza cliente di Windows disabilita anche alcune altre funzionalità di tracciamento che possono essere controllate individualmente anche con Criteri di gruppo. Non li elenchiamo tutti qui e non li disabilitiamo perché questa impostazione li copre.
#### Politiche del sistema operativo
- Permetti Cronologia Appunti: **Disabilitato**
- Consenti la sincronizzazione degli appunti tra i dispositivi: **Disabilitato**
- Abilita Feed Attività: **Disabilitato**
- Consenti la pubblicazione delle attività dell'utente: **Disabilitato**
- Consenti il caricamento delle attività dell'utente: **Disabilitato**
- Permetti Cronologia Appunti: **Disabilitato**
- Consenti la sincronizzazione degli appunti tra i dispositivi: **Disabilitato**
- Abilita Feed Attività: **Disabilitato**
- Consenti la pubblicazione delle attività dell'utente: **Disabilitato**
- Consenti il caricamento delle attività dell'utente: **Disabilitato**
#### Profili Utente
- Disattiva l'ID pubblicitario: **Abilitato**
- Disattiva l'ID pubblicitario: **Abilitato**
### Componenti di Windows
@@ -49,87 +49,87 @@ Si noti che la disabilitazione del programma di miglioramento dell'esperienza cl
AutoRun e AutoPlay sono funzioni che consentono a Windows di eseguire uno script o qualche altra attività quando un dispositivo è connesso, talvolta evitando le misure di sicurezza che prevedono il consenso dell'utente. Ciò potrebbe consentire a dispositivi non affidabili di eseguire codice dannoso a tua insaputa. È una buona pratica di sicurezza disabilitare queste funzioni e aprire manualmente i file sui dischi esterni.
- Disattiva AutoPlay: **Abilitato**
- Disabilita Autoplay per dispositivi senza volume: **Abilitato**
- Imposta il comportamento predefinito per AutoRun: **Abilitato**
- Comportamento AutoRun predefinito: **Non eseguire alcun comando AutoRun**
- Disattiva AutoPlay: **Abilitato**
- Disabilita Autoplay per dispositivi senza volume: **Abilitato**
- Imposta il comportamento predefinito per AutoRun: **Abilitato**
- Comportamento AutoRun predefinito: **Non eseguire alcun comando AutoRun**
#### Crittografia unità BitLocker
Si potrebbe desiderare di ri-crittografare l'unità del sistema operativo dopo aver modificato queste impostazioni.
- Scegli il metodo di crittografia dell'unità e la forza della cifratura (Windows Vista, Windows Server 2008, Windows 7): **Abilitato**
- Seleziona il metodo di cifratura: **AES-256**
- Scegli il metodo di crittografia dell'unità e la forza della cifratura (Windows Vista, Windows Server 2008, Windows 7): **Abilitato**
- Seleziona il metodo di cifratura: **AES-256**
Impostare la forza di cifratura per il criterio di Windows 7 continua ad applicare tale forza alle versioni più recenti di Windows.
##### Unità del Sistema Operativo
- Richiedi un'autenticazione aggiuntiva all'avvio: **Abilitato**
- Permetti i PIN migliorati per l'avvio: **Abilitato**
- Richiedi un'autenticazione aggiuntiva all'avvio: **Abilitato**
- Permetti i PIN migliorati per l'avvio: **Abilitato**
Despite the names of these policies, this doesn't _require_ you to do anything by default, but it will unlock the _option_ to have a more complex setup (such as requiring a PIN at startup in addition to the TPM) in the BitLocker setup wizard.
#### Contenuto cloud
- Disattiva il contenuto ottimizzato nel cloud: **Abilitato**
- Disattiva il contenuto dello stato dell'account del cloud consumer: **Abilitato**
- Non mostrare i suggerimenti di Windows: **Abilitato**
- Disattiva le esperienze dei consumatori Microsoft: **Abilitato**
- Disattiva il contenuto ottimizzato nel cloud: **Abilitato**
- Disattiva il contenuto dello stato dell'account del cloud consumer: **Abilitato**
- Non mostrare i suggerimenti di Windows: **Abilitato**
- Disattiva le esperienze dei consumatori Microsoft: **Abilitato**
#### Interfaccia Credenziale Utente
- Richiede un percorso attendibile per la voce credenziale: **Abilitato**
- Impedisci l'uso delle domande di sicurezza per gli account locali: **Abilitato**
- Richiede un percorso attendibile per la voce credenziale: **Abilitato**
- Impedisci l'uso delle domande di sicurezza per gli account locali: **Abilitato**
#### Raccolta dati e anteprima Builds
- Permetti Dati Diagnostici: **Abilitato**
- Opzioni: **Invia i dati diagnostici richiesti** (edizione Pro); oppure
- Opzioni: **Dati diagnostici disattivati** (Edizione Enterprise o Education)
- Limita la raccolta dei registri diagnostici: **Abilitato**
- Limitae la raccolta di dump: **Abilitato**
- Limita i dati diagnostici opzionali per Desktop Analytics: **Abilitato**
- Opzioni: **Disabilita la raccolta di Desktop Analytics**
- Non mostrare le notifiche di feedback: **Abilitato**
- Permetti Dati Diagnostici: **Abilitato**
- Opzioni: **Invia i dati diagnostici richiesti** (edizione Pro); oppure
- Opzioni: **Dati diagnostici disattivati** (Edizione Enterprise o Education)
- Limita la raccolta dei registri diagnostici: **Abilitato**
- Limitae la raccolta di dump: **Abilitato**
- Limita i dati diagnostici opzionali per Desktop Analytics: **Abilitato**
- Opzioni: **Disabilita la raccolta di Desktop Analytics**
- Non mostrare le notifiche di feedback: **Abilitato**
#### File Explorer
- Disattivare gli approfondimenti basati sull'account, i file recenti, preferiti e consigliati in Esplora file: **Abilitato**
- Disattivare gli approfondimenti basati sull'account, i file recenti, preferiti e consigliati in Esplora file: **Abilitato**
#### MDM
- Disattivare l'iscrizione MDM: **Abilitato**
- Disattivare l'iscrizione MDM: **Abilitato**
#### OneDrive
- Salva i documenti in OneDrive per impostazione predefinita: **Disabilitato**
- Impedire a OneDrive di generare traffico di rete finché l'utente non accede a OneDrive: **Abilitato**
- Impedire l'uso di OneDrive per l'archiviazione dei file: **Abilitato**
- Salva i documenti in OneDrive per impostazione predefinita: **Disabilitato**
- Impedire a OneDrive di generare traffico di rete finché l'utente non accede a OneDrive: **Abilitato**
- Impedire l'uso di OneDrive per l'archiviazione dei file: **Abilitato**
Quest'ultima impostazione disabilita OneDrive sul sistema; assicuratevi di cambiarla in **Disabilitato** se utilizzate OneDrive.
#### Push To Install
- Disattivare il servizio Push To Install: **Abilitato**
- Disattivare il servizio Push To Install: **Abilitato**
#### Ricerca
- Consenti Cortana: **Disabilitato**
- Non cercare sul web e non visualizzare i risultati web in Ricerca: **Abilitato**
- Imposta quali informazioni sono condivise in Ricerca: **Abilitato**
- Tipo di informazioni: **Informazioni anonime**
- Consenti Cortana: **Disabilitato**
- Non cercare sul web e non visualizzare i risultati web in Ricerca: **Abilitato**
- Imposta quali informazioni sono condivise in Ricerca: **Abilitato**
- Tipo di informazioni: **Informazioni anonime**
#### Sincronizza le impostazioni
- Non sincronizzare: **Abilitato**
- Non sincronizzare: **Abilitato**
#### Inserimento testo
- Migliora il riconoscimento della scrittura e della digitazione: **Disabilitato**
- Migliora il riconoscimento della scrittura e della digitazione: **Disabilitato**
#### Segnalazione degli errori di Windows
- Non inviare dati aggiuntivi: **Abilitato**
- Consenso > Configura consenso predefinito: **Abilitato**
- Livello di consenso: **Chiedere sempre prima di inviare i dati**
- Non inviare dati aggiuntivi: **Abilitato**
- Consenso > Configura consenso predefinito: **Abilitato**
- Livello di consenso: **Chiedere sempre prima di inviare i dati**

View File

@@ -7,7 +7,7 @@ cover: router.webp
<small>Protects against the following threat(s):</small>
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
Using **self-hosted software and services** can be a way to achieve a higher level of privacy through digital sovereignty, particularly independence from cloud servers controlled by product developers or vendors. By self-hosting, we mean hosting applications and data on your own hardware.
@@ -17,9 +17,9 @@ Self-hosting your own solutions requires advanced technical knowledge and a deep
<div class="grid cards" markdown>
- ![Stalwart logo](../assets/img/self-hosting/stalwart.svg){ .twemoji loading=lazy } [Stalwart](email-servers.md#stalwart)
- ![Mailcow logo](../assets/img/self-hosting/mailcow.svg){ .twemoji loading=lazy } [Mailcow](email-servers.md#mailcow)
- ![Mail-in-a-Box logo](../assets/img/self-hosting/mail-in-a-box.svg){ .twemoji loading=lazy } [Mail-in-a-Box](email-servers.md#mail-in-a-box)
- ![Stalwart logo](../assets/img/self-hosting/stalwart.svg){ .twemoji loading=lazy } [Stalwart](email-servers.md#stalwart)
- ![Mailcow logo](../assets/img/self-hosting/mailcow.svg){ .twemoji loading=lazy } [Mailcow](email-servers.md#mailcow)
- ![Mail-in-a-Box logo](../assets/img/self-hosting/mail-in-a-box.svg){ .twemoji loading=lazy } [Mail-in-a-Box](email-servers.md#mail-in-a-box)
</div>
@@ -66,21 +66,21 @@ Self-hosting your own instance of a web-based frontend can help you circumvent r
<div class="grid cards" markdown>
- ![Redlib logo](../assets/img/frontends/redlib.svg){ .lg .middle .twemoji } [**Redlib (Reddit)**](../frontends.md#redlib)
- ![Redlib logo](../assets/img/frontends/redlib.svg){ .lg .middle .twemoji } [**Redlib (Reddit)**](../frontends.md#redlib)
---
[:octicons-info-16:](https://github.com/redlib-org/redlib#deployment){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" }
- ![ProxiTok logo](../assets/img/frontends/proxitok.svg){ .lg .middle .twemoji } [**ProxiTok (TikTok)**](../frontends.md#proxitok)
- ![ProxiTok logo](../assets/img/frontends/proxitok.svg){ .lg .middle .twemoji } [**ProxiTok (TikTok)**](../frontends.md#proxitok)
---
[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki/Self-hosting){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" }
- ![Invidious logo](../assets/img/frontends/invidious.svg#only-light){ .twemoji }![Invidious logo](../assets/img/frontends/invidious-dark.svg#only-dark){ .twemoji } [**Invidious (YouTube)**](../frontends.md#invidious)
- ![Invidious logo](../assets/img/frontends/invidious.svg#only-light){ .twemoji }![Invidious logo](../assets/img/frontends/invidious-dark.svg#only-dark){ .twemoji } [**Invidious (YouTube)**](../frontends.md#invidious)
---
@@ -88,7 +88,7 @@ Self-hosting your own instance of a web-based frontend can help you circumvent r
[:octicons-info-16:](https://docs.invidious.io/installation){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" }
- ![Piped logo](../assets/img/frontends/piped.svg){ .twemoji } [**Piped (YouTube)**](../frontends.md#piped)
- ![Piped logo](../assets/img/frontends/piped.svg){ .twemoji } [**Piped (YouTube)**](../frontends.md#piped)
---
@@ -103,7 +103,7 @@ Tool recommendations in other categories of the website also provide a self-host
<div class="grid cards" markdown>
- ![Addy.io logo](../assets/img/email-aliasing/addy.svg){ .twemoji } [**Addy.io**](../email-aliasing.md#addyio)
- ![Addy.io logo](../assets/img/email-aliasing/addy.svg){ .twemoji } [**Addy.io**](../email-aliasing.md#addyio)
---
@@ -111,7 +111,7 @@ Tool recommendations in other categories of the website also provide a self-host
[:octicons-info-16:](https://addy.io/self-hosting){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/anonaddy){ .card-link title="Source Code" }
- ![SimpleLogin logo](../assets/img/email-aliasing/simplelogin.svg){ .twemoji } [**SimpleLogin**](../email-aliasing.md#simplelogin)
- ![SimpleLogin logo](../assets/img/email-aliasing/simplelogin.svg){ .twemoji } [**SimpleLogin**](../email-aliasing.md#simplelogin)
---
@@ -119,7 +119,7 @@ Tool recommendations in other categories of the website also provide a self-host
[:octicons-info-16:](https://github.com/simple-login/app#prerequisites){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
- ![CryptPad logo](../assets/img/document-collaboration/cryptpad.svg){ .twemoji } [**CryptPad**](../document-collaboration.md#cryptpad)
- ![CryptPad logo](../assets/img/document-collaboration/cryptpad.svg){ .twemoji } [**CryptPad**](../document-collaboration.md#cryptpad)
---
@@ -127,7 +127,7 @@ Tool recommendations in other categories of the website also provide a self-host
[:octicons-info-16:](https://docs.cryptpad.org/en/admin_guide/index.html){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" }
- ![Miniflux logo](../assets/img/news-aggregators/miniflux.svg#only-light){ .twemoji }![Miniflux logo](../assets/img/news-aggregators/miniflux-dark.svg#only-dark){ .twemoji } [**Miniflux**](../news-aggregators.md#miniflux)
- ![Miniflux logo](../assets/img/news-aggregators/miniflux.svg#only-light){ .twemoji }![Miniflux logo](../assets/img/news-aggregators/miniflux-dark.svg#only-dark){ .twemoji } [**Miniflux**](../news-aggregators.md#miniflux)
---
@@ -135,7 +135,7 @@ Tool recommendations in other categories of the website also provide a self-host
[:octicons-info-16:](https://miniflux.app/docs/index.html#administration-guide){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" }
- ![Standard Notes logo](../assets/img/notebooks/standard-notes.svg){ .twemoji } [**Standard Notes**](../notebooks.md#standard-notes)
- ![Standard Notes logo](../assets/img/notebooks/standard-notes.svg){ .twemoji } [**Standard Notes**](../notebooks.md#standard-notes)
---
@@ -143,7 +143,7 @@ Tool recommendations in other categories of the website also provide a self-host
[:octicons-info-16:](https://standardnotes.com/help/47/can-i-self-host-standard-notes){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" }
- ![PrivateBin logo](../assets/img/pastebins/privatebin.svg){ .twemoji } [**PrivateBin**](../pastebins.md#privatebin)
- ![PrivateBin logo](../assets/img/pastebins/privatebin.svg){ .twemoji } [**PrivateBin**](../pastebins.md#privatebin)
---
@@ -151,7 +151,7 @@ Tool recommendations in other categories of the website also provide a self-host
[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/blob/master/doc/Installation.md){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
- ![Paaster logo](../assets/img/pastebins/paaster.svg){ .twemoji } [**Paaster**](../pastebins.md#paaster)
- ![Paaster logo](../assets/img/pastebins/paaster.svg){ .twemoji } [**Paaster**](../pastebins.md#paaster)
---
@@ -159,7 +159,7 @@ Tool recommendations in other categories of the website also provide a self-host
[:octicons-info-16:](https://github.com/WardPearce/paaster#deployment){ .card-link title="Admin Documentation" }
[:octicons-code-16:](https://github.com/WardPearce/paaster){ .card-link title="Source Code" }
- ![SimpleX Chat logo](../assets/img/messengers/simplex.svg){ .twemoji } [**SimpleX Chat**](../real-time-communication.md#simplex-chat)
- ![SimpleX Chat logo](../assets/img/messengers/simplex.svg){ .twemoji } [**SimpleX Chat**](../real-time-communication.md#simplex-chat)
---

View File

@@ -7,8 +7,8 @@ cover: social-networks.webp
<small>Protezione dalle seguenti minacce:</small>
- [:material-close-outline: Censura](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
- [:material-account-cash: Capitalismo della Sorveglianza](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-close-outline: Censura](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
- [:material-account-cash: Capitalismo della Sorveglianza](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
Questi **social network** che rispettano la privacy ti consentono di partecipare alle comunità online senza fornire informazioni personali come nome e cognome, numero di telefono e altri dati comunemente richiesti dalle aziende tecnologiche.
@@ -20,25 +20,25 @@ Dovresti tenere in considerazione che i social network **non** sono adatti per l
## Decentralizzazione
Decentralized social networks are built on an architecture that is fundamentally different than mainstream social media platforms, yet quite similar to the underlying structure of email. Instead of opening an account under a single, unified service like you would for Facebook or Discord, you instead choose an independent, public server to join. The server you join can communicate with and discover other servers; this aspect of decentralization is also known as _federation_.
I social network decentralizzati sono costruiti su un'architettura che è fondamentalmente differente dalle piattaforme di social media mainstream, ma è molto simile alla struttura sottostante alle email. Invece di aprire un account per un singolo servizio unificato come faresti per Facebook o Discord, puoi scegliere un server pubblico e indipendente a cui unirti. Il server su cui ti unisci può comunicare e scoprire gli altri server; questo aspetto della decentralizzazione è noto anche come _federazione_.
A significant benefit of this decentralized model is that there is no central authority which can censor your account across the entire network, though it is possible for your account to be banned or silenced by an individual server.
Un beneficio significativo di questo modello decentralizzato è che non c'è un'autorità centrale che può censurare il tuo account attraverso l'intera rete, ma è possibile che il tuo account venga bannato o silenziato da un singolo server.
A caveat of this decentralized model is that each server is its own legal entity, with its own privacy policy, terms of use, administration team, and moderators. While many of these servers are far _less_ restrictive and more privacy-respecting than traditional social media platforms, some can be far _more_ restrictive or potentially _worse_ for your privacy. Typically, the software on which the social network runs does not discriminate between these administrators or place any limitations on their powers.
In questo modello decentralizzato ogni server è un'entità legale a sé stante, con una propria informativa sulla privacy, termini di utilizzo, team di amministrazione e moderatori. Mentre molti di questi server sono molto _meno_ restrittivi e più rispettosi della privacy rispetto alle piattaforme di social media tradizionali, alcuni possono essere molto _più_ restrittivi o potenzialmente _peggiori_ per la tua privacy. In genere, il software su cui si basa il social network non fa discriminazioni tra questi amministratori né pone limitazioni ai loro poteri.
## Censorship Resistance
## Resistenza alla Censura
While censorship in decentralized social networks does not exist on a network level, it is very possible to experience censorship on a server level depending on a server's administrator. Administrators have the power to _defederate_ from other servers, which leads to limiting the content you can view and the people you can interact with.
Mentre la censura nei social network decentralizzati non esiste a livello della rete, è possibile sperimentare la censura a livello del server a seconda dell'amministratore del server. Gli amministratori hanno il potere di _defederarsi_ da altri server, il che porta a limitare i contenuti che puoi visualizzare e le persone con cui puoi interagire.
If you are greatly concerned about an existing server censoring your content, the content available to you, or other servers, you generally have two options:
Se sei molto preoccupato per un server esistente che censura i tuoi contenuti, i contenuti a tua disposizione o altri server, in genere hai due opzioni:
1. **Host the social network software yourself.** This approach gives you the exact same censorship resistance as any other website you can host yourself, which is fairly high.
1. **Ospita tu stesso il software del social network.** Questo approccio ti dà esattamente la stessa resistenza alla censura che qualsiasi altro sito web che puoi ospitare tu stesso, il quale è abbastanza alto.
2. **Use a managed hosting service.** We don't have any specific recommendations, but there are a variety of hosting services which will create a brand-new server on your own domain (or occasionally a subdomain of their domain, but we recommend against this unless registering your own domain presents too much of a burden to your privacy).
2. **Usa un servizio di hosting gestito.** Non abbiamo alcuna raccomandazione specifica, ma ci sono una varietà di servizi di hosting che creeranno un server nuovo di zecca su un tuo dominio (o occasionalmente un sottodominio del loro dominio, ma non ti consigliamo questa opzione a meno che la registrazione del proprio dominio presenti un onere eccessivo per la tua privacy).
Typically, hosting providers will handle the _technical_ side of your server, but completely leave the _moderation_ side up to you. This often represents a better approach than self-hosting for most people because you can benefit from greater control over your own server without worrying about technical problems or unpatched security vulnerabilities.
In genere, i provider di hosting si occupano della parte _tecnica_ del tuo server, ma lasciano completamente a te la parte di _moderazione_. Per la maggior parte delle persone questo rappresenta un approccio migliore rispetto al self-hosting, in quanto si può beneficiare di un maggiore controllo sul proprio server senza preoccuparsi di problemi tecnici o vulnerabilità di sicurezza non risolte.
You should look closely at your hosting provider's terms of service and acceptable use policies before registering. These are often far more broad than typical hosted server rules, and they are far less likely to be enforced without recourse, but they can still be restrictive in undesirable ways.
Prima di registrarti dovresti esaminare attentamente le condizioni di servizio del tuo provider di hosting e l'informativa degli utilizzi accettabili. Queste sono spesso molto più ampie delle normali regole di server hosted e hanno molta meno probabilità di essere applicate senza ricorso, ma possono comunque essere restrittive in modi indesiderati.
## Mastodon
@@ -75,13 +75,13 @@ From Mastodon's web interface, click the **Administration** link in the right si
There are a number of privacy controls under the **privacy and reach** tab here. Most notably, pay attention to these:
- [ ] **Automatically accept new followers**: You should consider unchecking this box to have a private profile. This will allow you to review who can follow your account before accepting them.
- **Automatically accept new followers**: You should consider unchecking this box to have a private profile. This will allow you to review who can follow your account before accepting them.
In contrast to most social media platforms, if you have a private profile you still have the _option_ to publish posts which are publicly visible to non-followers and can still be boosted by non-followers. Therefore, unchecking this box is the only way to have the _choice_ to publish to either the entire world or a select group of people.
- [ ] **Show follows and followers on profile**: You should uncheck this box to hide your social graph from the public. It is fairly uncommon for the list of people you follow to have some genuine benefit to others, but that information can present a risk to you.
- **Show follows and followers on profile**: You should uncheck this box to hide your social graph from the public. It is fairly uncommon for the list of people you follow to have some genuine benefit to others, but that information can present a risk to you.
- [ ] **Display from which app you sent a post**: You should uncheck this box to prevent revealing information about your personal computing setup to others unnecessarily.
- **Display from which app you sent a post**: You should uncheck this box to prevent revealing information about your personal computing setup to others unnecessarily.
The other privacy controls on this page should be read through, but we would stress that they are **not** technical controls—they are merely requests that you make to others. For example, if you choose to hide your profile from search engines on this page, **nothing** is actually stopping a search engine from reading your profile. You are merely requesting search engine indexes not publish your content to their users.
@@ -95,7 +95,7 @@ Note that this only changes your default settings to prevent accidental over-sha
#### Automated post deletion
- [x] Check the **Automatically delete old posts** box.
- Check the **Automatically delete old posts** box.
The default settings here are fine, and will delete any posts you make after 2 weeks, unless you favorite (star) them. This gives you an easy way to control which posts stick around forever, and which ones are only ephemeral. Many settings about how long and when posts are kept can be adjusted here to suit your own needs, however.
@@ -105,10 +105,10 @@ It is very rare for social media posts older than a few weeks to be read or rele
When publishing a new post, you will have the option to choose from one of these visibility settings:
- **Public**, which publishes your content to anyone on the internet.
- **Quiet public**, which you should consider equivalent to publicly posting! This is not a technical guarantee, but merely a request you are making to other servers to hide your post from some feeds.
- **Followers**, which publishes your content only to your followers. If you did not follow our recommendation of restricting your followers, you should consider this equivalent to publicly posting!
- **Specific people**, which only shares the post with people who are specifically mentioned within the post. This is Mastodon's version of direct messages, but should never be relied on for private communications as we covered earlier since Mastodon has no E2EE.
- **Public**, which publishes your content to anyone on the internet.
- **Quiet public**, which you should consider equivalent to publicly posting! This is not a technical guarantee, but merely a request you are making to other servers to hide your post from some feeds.
- **Followers**, which publishes your content only to your followers. If you did not follow our recommendation of restricting your followers, you should consider this equivalent to publicly posting!
- **Specific people**, which only shares the post with people who are specifically mentioned within the post. This is Mastodon's version of direct messages, but should never be relied on for private communications as we covered earlier since Mastodon has no E2EE.
If you used our recommended configuration settings above, you should be posting to **Followers** by default, and only posting to **Public** on an intentional and case-by-case basis.
@@ -127,13 +127,13 @@ If you used our recommended configuration settings above, you should be posting
<details class="downloads" markdown><summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067)
- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases)
- [:fontawesome-brands-windows: Windows](https://element.io/download)
- [:simple-apple: macOS](https://element.io/download)
- [:simple-linux: Linux](https://element.io/download)
- [:octicons-browser-16: Web](https://app.element.io)
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067)
- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases)
- [:fontawesome-brands-windows: Windows](https://element.io/download)
- [:simple-apple: macOS](https://element.io/download)
- [:simple-linux: Linux](https://element.io/download)
- [:octicons-browser-16: Web](https://app.element.io)
</details>
@@ -155,15 +155,15 @@ To prevent revealing information about your personal device to others unnecessar
#### Preferences
- [ ] Uncheck **Send read receipts**
- [ ] Uncheck **Send typing notifications**
- Uncheck **Send read receipts**
- Uncheck **Send typing notifications**
You should uncheck these options to reduce the exposure of metadata to other users when chatting in a public room.
#### Voice & Video
- [ ] Uncheck **Allow Peer-to-Peer for 1:1 calls**
- [ ] Uncheck **Allow fallback call assist server (turn.matrix.org)**
- Uncheck **Allow Peer-to-Peer for 1:1 calls**
- Uncheck **Allow fallback call assist server (turn.matrix.org)**
If you do decide to use Element for one-to-one communication, we recommend unchecking these settings to prevent the exposure of your IP address to the other party.
@@ -177,13 +177,13 @@ As an end user on a public homeserver, you can consider unchecking the **Enable
##### Sessions
- [ ] (Optional) Uncheck **Record the client name, version, and url to recognize sessions for easily in session manager**
- (Optional) Uncheck **Record the client name, version, and url to recognize sessions for easily in session manager**
Unchecking this option may make it more diffcult to discern your active sessions if you logged in to your Matrix account on multiple devices.
#### Crittografia
- [x] (Optional) Check **In encrypted rooms, only send messages to verified users**
- (Optional) Check **In encrypted rooms, only send messages to verified users**
With this setting enabled, unverified users (i.e., those who have not used the **Verify User** function) and unverified devices of verified users will not receive your messages in a room with encryption enabled. This may limit the messages you can view and the people you can interact with.
@@ -191,11 +191,11 @@ With this setting enabled, unverified users (i.e., those who have not used the *
**Ti preghiamo di notare che non siamo affiliati con alcun progetto che consigliamo.** Oltre ai nostri [criteri standard](about/criteria.md), abbiamo sviluppato un chiaro insieme di requisiti per consentirci di fornire dei consigli oggettivi. Ti suggeriamo di familiarizzare con questo elenco prima di scegliere di utilizzare un progetto e di condurre le tue ricerche per assicurarti che si tratti della scelta adatta a te.
- Must be free and open-source software.
- Must use a federated protocol to communicate with other instances of the social networking software.
- Must not have non-technical restrictions on who can be federated with.
- Must be usable within a standard [web browser](desktop-browsers.md).
- Must make public content accessible to visitors without an account.
- Must allow you to limit who can follow your profile.
- Must allow you to post content visible only to your followers.
- Must support modern web application security standards/features (including [multifactor authentication](multi-factor-authentication.md)).
- Must be free and open-source software.
- Must use a federated protocol to communicate with other instances of the social networking software.
- Must not have non-technical restrictions on who can be federated with.
- Must be usable within a standard [web browser](desktop-browsers.md).
- Must make public content accessible to visitors without an account.
- Must allow you to limit who can follow your profile.
- Must allow you to post content visible only to your followers.
- Must support modern web application security standards/features (including [multifactor authentication](multi-factor-authentication.md)).