1
0
mirror of https://github.com/privacyguides/i18n.git synced 2026-04-16 18:29:21 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2024-01-06 21:31:25 +00:00
parent c470944458
commit 8ea4453a07
58 changed files with 58 additions and 58 deletions

View File

@@ -20,7 +20,7 @@ cover: vpn.webp
**لن يؤدي** استخدام شبكة خاصة افتراضية إلى إبقاء عاداتك التصفحية مجهولة الهُوِيَّة، ولن يضيف حماية إلى الاتصالات المستخدمة لميفاق (HTTP) الغير آمنة. **لن يؤدي** استخدام شبكة خاصة افتراضية إلى إبقاء عاداتك التصفحية مجهولة الهُوِيَّة، ولن يضيف حماية إلى الاتصالات المستخدمة لميفاق (HTTP) الغير آمنة.
في حال بحثك عن **إخفاء الخوية**، يجب استخدم متصفح Tor بدلاً من شبكة خاصة افتراضية. If you are looking for **anonymity**, you should use the Tor Browser.
إذا كنت تبحث عن **أمان** إضافي، يجب التأكد من الاتصال بمواقع الويب باستخدام ميفاق HTTPS. الشبكات الخاصة الافتراضية ليست بديلاً للممارسات الأمنية الجيدة. إذا كنت تبحث عن **أمان** إضافي، يجب التأكد من الاتصال بمواقع الويب باستخدام ميفاق HTTPS. الشبكات الخاصة الافتراضية ليست بديلاً للممارسات الأمنية الجيدة.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ Wenn du auf der Suche nach zusätzlicher **Privatsphäre** vor deinem ISP, in ei
Mit einem VPN bleiben deine Surfgewohnheiten **nicht** anonym, und es bietet auch keine zusätzliche Sicherheit für unsicheren (HTTP) Verkehr. Mit einem VPN bleiben deine Surfgewohnheiten **nicht** anonym, und es bietet auch keine zusätzliche Sicherheit für unsicheren (HTTP) Verkehr.
Wenn du auf der Suche nach **Anonymität** bist, solltest du den Tor-Browser **anstelle** eines VPNs verwenden. If you are looking for **anonymity**, you should use the Tor Browser.
Wenn du auf der Suche nach zusätzlicher **Sicherheit** bist, solltest du immer sicherstellen, dass du eine Verbindung zu Websites über HTTPS herstellst. Ein VPN ist kein Ersatz für gute Sicherheitspraktiken. Wenn du auf der Suche nach zusätzlicher **Sicherheit** bist, solltest du immer sicherstellen, dass du eine Verbindung zu Websites über HTTPS herstellst. Ein VPN ist kein Ersatz für gute Sicherheitspraktiken.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ Si buscas **privacidad** adicional de tu proveedor de servicios de internet, en
El uso de una VPN **no** mantendrá sus hábitos de navegación en el anonimato, ni añadirá seguridad adicional al tráfico no seguro (HTTP). El uso de una VPN **no** mantendrá sus hábitos de navegación en el anonimato, ni añadirá seguridad adicional al tráfico no seguro (HTTP).
Si está buscando **anonimato**, debería usar el navegador Tor **en lugar** de una VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Si busca mayor **seguridad**, debería asegurarse siempre de que se conecta a sitios web que utilicen HTTPS. Una VPN no sustituye las buenas prácticas de seguridad. Si busca mayor **seguridad**, debería asegurarse siempre de que se conecta a sitios web que utilicen HTTPS. Una VPN no sustituye las buenas prácticas de seguridad.

View File

@@ -20,7 +20,7 @@ cover: vpn.webp
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ Si vous recherchez à protéger votre **vie privée** vis-à-vis de votre FAI, s
L'utilisation d'un VPN ne rendra **pas** votre navigation anonyme et n'ajoutera pas de sécurité supplémentaire à un trafic non sécurisé (HTTP). L'utilisation d'un VPN ne rendra **pas** votre navigation anonyme et n'ajoutera pas de sécurité supplémentaire à un trafic non sécurisé (HTTP).
Si vous recherchez l'**anonymat**, vous devriez utiliser le navigateur Tor **au lieu** d'un VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Si vous recherchez plus de **sécurité**, vous devez toujours vous assurer que vous vous connectez aux sites web en utilisant HTTPS. Un VPN ne remplace pas les bonnes pratiques de sécurité. Si vous recherchez plus de **sécurité**, vous devez toujours vous assurer que vous vous connectez aux sites web en utilisant HTTPS. Un VPN ne remplace pas les bonnes pratiques de sécurité.

View File

@@ -20,7 +20,7 @@ cover: vpn.webp
שימוש ב-VPN **לא** ישמור על הרגלי הגלישה שלך אנונימיים, וגם לא יוסיף אבטחה לתעבורה לא מאובטחת (HTTP). שימוש ב-VPN **לא** ישמור על הרגלי הגלישה שלך אנונימיים, וגם לא יוסיף אבטחה לתעבורה לא מאובטחת (HTTP).
אם אתם מחפשים **אנונימיות**, כדאי להשתמש בדפדפן Tor **במקום** ב-VPN. If you are looking for **anonymity**, you should use the Tor Browser.
אם אתה מחפש **אבטחה** נוספת, עליך תמיד לוודא שאתה מתחבר לאתרים באמצעות HTTPS. VPN אינו תחליף לשיטות אבטחה טובות. אם אתה מחפש **אבטחה** נוספת, עליך תמיד לוודא שאתה מתחבר לאתרים באמצעות HTTPS. VPN אינו תחליף לשיטות אבטחה טובות.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Egy VPN használata **nem** fogja anonimizálni a böngészési szokásaidat, és nem biztosít további védelmet nem biztonságos (HTTP) forgalomnak. Egy VPN használata **nem** fogja anonimizálni a böngészési szokásaidat, és nem biztosít további védelmet nem biztonságos (HTTP) forgalomnak.
Ha **anonimitást** keresel, akkor a Tor böngészőt érdemes használnod egy VPN **helyett**. If you are looking for **anonymity**, you should use the Tor Browser.
Ha több **biztonságot** keresel, mindig győződj meg arról, hogy a weboldalakhoz HTTPS használatával csatlakozol. Egy VPN nem helyettesít helyes biztonsági gyakorlatokat. Ha több **biztonságot** keresel, mindig győződj meg arról, hogy a weboldalakhoz HTTPS használatával csatlakozol. Egy VPN nem helyettesít helyes biztonsági gyakorlatokat.

View File

@@ -20,7 +20,7 @@ Jika Anda mencari **privasi tambahan** dari ISP Anda, pada jaringan Wi-Fi publik
Menggunakan VPN **tidak** akan menjaga kebiasaan jelajah Anda tetap anonim, dan juga tidak akan menambah keamanan tambahan pada lalu lintas yang tidak aman (HTTP). Menggunakan VPN **tidak** akan menjaga kebiasaan jelajah Anda tetap anonim, dan juga tidak akan menambah keamanan tambahan pada lalu lintas yang tidak aman (HTTP).
Jika Anda membutuhkan **anonimitas**, Anda sebaiknya menggunakan Tor Browser **daripada** menggunakan VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Jika Anda membutuhkan **keamanan** tambahan, Anda harus selalu memastikan bahwa Anda terhubung ke situs web menggunakan HTTPS. VPN bukanlah pengganti praktik keamanan yang baik. Jika Anda membutuhkan **keamanan** tambahan, Anda harus selalu memastikan bahwa Anda terhubung ke situs web menggunakan HTTPS. VPN bukanlah pengganti praktik keamanan yang baik.

View File

@@ -20,7 +20,7 @@ Se desideri ulteriore **privacy** dal tuo ISP, su una rete Wi-Fi pubblica, o dur
L'utilizzo di una VPN **non** manterrà anonime le tue abitudini di navigazione, né aggiungerà ulteriore sicurezza al traffico non sicuro (HTTP). L'utilizzo di una VPN **non** manterrà anonime le tue abitudini di navigazione, né aggiungerà ulteriore sicurezza al traffico non sicuro (HTTP).
Se stai cercando l'**anonimato**, dovresti utilizzare Tor Browser **invece** di una VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Se stai cercando maggiore **sicurezza**, dovresti sempre assicurarti di connetterti a siti web che utilizzano HTTPS. Una VPN non è un sostituto per buone pratiche di sicurezza. Se stai cercando maggiore **sicurezza**, dovresti sempre assicurarti di connetterti a siti web che utilizzano HTTPS. Una VPN non è un sostituto per buone pratiche di sicurezza.

View File

@@ -20,7 +20,7 @@ ISPや公共Wi-Fiネットワークから**プライバシー**をより一層
VPNを使用しても、ブラウジング習慣を匿名化したり、安全でない通信HTTPへのセキュリティーが強化されたりすることは**ありません**。 VPNを使用しても、ブラウジング習慣を匿名化したり、安全でない通信HTTPへのセキュリティーが強化されたりすることは**ありません**。
**匿名性**を確保するには、VPNの**代わりに**Tor Browserを使用してください。 If you are looking for **anonymity**, you should use the Tor Browser.
**セキュリティー**を強化するには、ウェブサイトへの接続に常にHTTPSを使用してください。 VPNは、優れたセキュリティーの代わりにはなりません。 **セキュリティー**を強化するには、ウェブサイトへの接続に常にHTTPSを使用してください。 VPNは、優れたセキュリティーの代わりにはなりません。

View File

@@ -20,7 +20,7 @@ ISP로부터의 **프라이버시**가 필요하거나, 공용 Wi-Fi에 연결
VPN은 브라우저 사용 패턴을 익명화하지 않고, 보호되지 않은 트래픽 (HTTP)에 추가적인 보안을 제공하지 않습니다. VPN은 브라우저 사용 패턴을 익명화하지 않고, 보호되지 않은 트래픽 (HTTP)에 추가적인 보안을 제공하지 않습니다.
만약 익명성이 필요하다면 VPN 대신 Tor 브라우저를 사용해야 합니다. If you are looking for **anonymity**, you should use the Tor Browser.
만약 추가적인 보안이 필요하다면, 연결된 웹사이트가 HTTPS를 사용하는지 꼭 확인해야 합니다. VPN은 올바른 보안 관행을 대체할 수 없습니다. 만약 추가적인 보안이 필요하다면, 연결된 웹사이트가 HTTPS를 사용하는지 꼭 확인해야 합니다. VPN은 올바른 보안 관행을 대체할 수 없습니다.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ Als je op zoek bent naar extra **privacy** van uw ISP, op een openbaar Wi-Fi-net
Het gebruik van een VPN houdt jouw surfgedrag niet anoniem, ook voegt het geen extra beveiliging toe aan niet-beveiligd (HTTP) verkeer. Het gebruik van een VPN houdt jouw surfgedrag niet anoniem, ook voegt het geen extra beveiliging toe aan niet-beveiligd (HTTP) verkeer.
Als je op zoek bent naar **anonimiteit**, moet je de Tor Browser gebruiken **in plaats** van een VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Als je op zoek bent naar extra **veiligheid**, moet je er altijd voor zorgen dat je verbinding maakt met websites via HTTPS. Een VPN is geen vervanging voor goede beveiligingspraktijken. Als je op zoek bent naar extra **veiligheid**, moet je er altijd voor zorgen dat je verbinding maakt met websites via HTTPS. Een VPN is geen vervanging voor goede beveiligingspraktijken.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ Se você está procurando mais **privacidade** do seu provedor de internet (ISP)
Usar uma VPN **não** manterá seus hábitos de navegação anônimos, nem adicionará segurança ao tráfego não seguro (HTTP). Usar uma VPN **não** manterá seus hábitos de navegação anônimos, nem adicionará segurança ao tráfego não seguro (HTTP).
Se você está procurando por **anonimato**, você deve usar o Navegador Tor **ao invés de ** de uma VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Se você está procurando por * * segurança * * adicional, você sempre deve verificar se está se conectando a sites que usam HTTPS. Uma VPN não substitui boas práticas de segurança. Se você está procurando por * * segurança * * adicional, você sempre deve verificar se está se conectando a sites que usam HTTPS. Uma VPN não substitui boas práticas de segurança.

View File

@@ -20,7 +20,7 @@ Se procura privacidade adicional **** para o seu ISP, quando usa uma rede Wi-Fi
A utilização de uma VPN **não** manterá a sua navegação anónima, nem acrescentará segurança adicional ao tráfego não seguro (HTTP). A utilização de uma VPN **não** manterá a sua navegação anónima, nem acrescentará segurança adicional ao tráfego não seguro (HTTP).
Se procura **anonimato**, deve utilizar o browser Tor **em vez** de uma VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Se procura mais **segurança**, deve sempre garantir que se liga a sites que utilizem ligações HTTPS. Uma VPN não substitui as boas práticas de segurança. Se procura mais **segurança**, deve sempre garantir que se liga a sites que utilizem ligações HTTPS. Uma VPN não substitui as boas práticas de segurança.

View File

@@ -20,7 +20,7 @@ cover: vpn.webp
Использование VPN **не обеспечивает** анонимность ваших привычек при просмотре веб-страниц, а также **не прибавляет** безопасности при использовании незащищенного (HTTP) трафика. Использование VPN **не обеспечивает** анонимность ваших привычек при просмотре веб-страниц, а также **не прибавляет** безопасности при использовании незащищенного (HTTP) трафика.
Если вам нужна **анонимность**, вам следует использовать браузер Tor **вместо** VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Если вам нужна дополнительная **безопасность**, убедитесь, что вы подключаетесь к веб-сайтам, используя HTTPS. VPN не является заменой полезных привычек для обеспечения безопасности. Если вам нужна дополнительная **безопасность**, убедитесь, что вы подключаетесь к веб-сайтам, используя HTTPS. VPN не является заменой полезных привычек для обеспечения безопасности.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
En VPN kommer **inte** att hålla dina surfvanor anonyma, och inte heller kommer den att lägga till ytterligare säkerhet för icke-säker (HTTP) trafik. En VPN kommer **inte** att hålla dina surfvanor anonyma, och inte heller kommer den att lägga till ytterligare säkerhet för icke-säker (HTTP) trafik.
Om du är ute efter **anonymitet** bör du använda Tor Browser **i stället** för en VPN. If you are looking for **anonymity**, you should use the Tor Browser.
Om du vill öka **säkerheten** bör du alltid se till att du ansluter till webbplatser med HTTPS. En VPN är inte en ersättning för goda säkerhetsrutiner. Om du vill öka **säkerheten** bör du alltid se till att du ansluter till webbplatser med HTTPS. En VPN är inte en ersättning för goda säkerhetsrutiner.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. Using a VPN will **not** keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for **anonymity**, you should use the Tor Browser **instead** of a VPN. If you are looking for **anonymity**, you should use the Tor Browser.
If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices.

View File

@@ -20,7 +20,7 @@ cover: vpn.webp
使用 VPN 將 **不會** 讓您的瀏覽習慣被匿名,也不會替不安全( HTTP )流量增加額外的安全性。 使用 VPN 將 **不會** 讓您的瀏覽習慣被匿名,也不會替不安全( HTTP )流量增加額外的安全性。
如果您追求的是 **匿名性** ,應該使用 Tor 瀏覽器 **代替** VPN。 If you are looking for **anonymity**, you should use the Tor Browser.
如果要的是更多 **安全性** ,您應該確保您全程使用 HTTPS 連接到網站。 VPN 不能取代良好的安全措施。 如果要的是更多 **安全性** ,您應該確保您全程使用 HTTPS 連接到網站。 VPN 不能取代良好的安全措施。

View File

@@ -20,7 +20,7 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
使用VPN **不** 会隐藏你的浏览习惯, 它也不会为不安全(HTTP) 流量额外增加安全性。 使用VPN **不** 会隐藏你的浏览习惯, 它也不会为不安全(HTTP) 流量额外增加安全性。
如果你在寻求**匿名**, 你应该使用Tor 浏览器 **而不是** VPN。 If you are looking for **anonymity**, you should use the Tor Browser.
如果你在寻求增进**安全**, 你应该始终确保在使用 HTTPS连接到网站。 VPN不是良好安全实践的替代品。 如果你在寻求增进**安全**, 你应该始终确保在使用 HTTPS连接到网站。 VPN不是良好安全实践的替代品。

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to

View File

@@ -1,6 +1,6 @@
<!-- {# <!-- {#
Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com> Copyright (c) 2016-2022 Martin Donath <martin.donath@squidfunk.com>
Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net> Copyright (c) 2022-2024 Jonah Aragon <jonah@triplebit.net>
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to of this software and associated documentation files (the "Software"), to